Secure Software Engineering: Learning from the Past to Address Future Challenges
Information Security Journal: A Global Perspective
SAFECOMP '09 Proceedings of the 28th International Conference on Computer Safety, Reliability, and Security
Fuzzy classification metrics for scanner assessment and vulnerability reporting
IEEE Transactions on Information Forensics and Security
Are markets for vulnerabilities effective?
MIS Quarterly
Towards quantitative risk management for next generation networks
Telecommunication Economics
Hi-index | 0.00 |
Any given piece of software has some number of publicly disclosed vulnerabilities at any moment, leaving the system exposed to potential attack. The author presents a method for identifying and analyzing these vulnerabilities using public data from easily accessible sources.