Seguir
Karen Scarfone
Karen Scarfone
Principal Consultant, Scarfone Cybersecurity
Email confirmado em scarfonecybersecurity.com - Página inicial
Título
Citado por
Citado por
Ano
Guide to industrial control systems (ICS) security
K Stouffer, J Falco, K Scarfone
NIST special publication 800 (82), 16-16, 2011
25622011
Blockchain technology overview
D Yaga, P Mell, N Roby, K Scarfone
arXiv preprint arXiv:1906.11078, 2019
20292019
Guide to intrusion detection and prevention systems (idps)
K Scarfone, P Mell
NIST special publication 800 (2007), 94, 2007
19862007
Guide to attribute based access control (abac) definition and considerations (draft)
VC Hu, D Ferraiolo, R Kuhn, AR Friedman, AJ Lang, MM Cogdell, ...
NIST special publication 800 (162), 1-54, 2013
14252013
A complete guide to the common vulnerability scoring system version 2.0
P Mell, K Scarfone, S Romanosky
Published by FIRST-forum of incident response and security teams 1, 23, 2007
955*2007
Common vulnerability scoring system
P Mell, K Scarfone, S Romanosky
IEEE Security & Privacy 4 (6), 85-89, 2006
7382006
Computer security incident handling guide
P Cichonski, T Millar, T Grance, K Scarfone
NIST Special Publication 800 (61), 1-147, 2012
6862012
Technical guide to information security testing and assessment
K Scarfone, M Souppaya, A Cody, A Orebaugh
NIST Special Publication 800 (115), 2-25, 2008
5782008
Sp 800-122. guide to protecting the confidentiality of personally identifiable information (pii)
E McCallister, T Grance, KA Scarfone
National Institute of Standards & Technology, 2010
576*2010
Guide to computer security log management
K Kent, M Souppaya
NIST special publication 92, 1-72, 2006
4622006
Guide to malware incident prevention and handling
P Mell, K Kent, J Nusbaum
US Department of Commerce, Technology Administration, National Institute of …, 2005
430*2005
Guidelines on firewalls and firewall policy
J Wack, K Cutler, J Pole
NIST special publication 800, 41, 2002
428*2002
Guide to bluetooth security: recommendations of the national institute of standards and technology
J Padgette, K Scarfone
US Department of Commerce, National Institute of Standards and Technology, 2011
418*2011
Guide to cyber threat information sharing
C Johnson, L Badger, D Waltermire, J Snyder, C Skorupka
NIST special publication 800 (150), 35, 2016
3272016
An analysis of CVSS version 2 vulnerability scoring
K Scarfone, P Mell
2009 3rd International Symposium on Empirical Software Engineering and …, 2009
2532009
Guide to security for full virtualization technologies
MP Souppaya, K Scarfone, P Hoffman
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman, 2011
177*2011
Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks
K Boeckl, K Boeckl, M Fagan, W Fisher, N Lefkovitz, KN Megas, E Nadeau, ...
US Department of Commerce, National Institute of Standards and Technology, 2019
1602019
Guidelines for managing the security of mobile devices in the enterprise
M Souppaya, K Scarfone
NIST special publication 800 (124), 124-800, 2013
1512013
Improving the common vulnerability scoring system
P Mell, K Scarfone
IET Information Security 1 (3), 119-127, 2007
1392007
Application container security guide
M Souppaya, J Morello, K Scarfone
National Institute of Standards and Technology, 2017
1362017
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20