Empirical studies of software engineering: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Large-scale vulnerability analysis
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
An inquiry into the nature and causes of the wealth of internet miscreants
Proceedings of the 14th ACM conference on Computer and communications security
An Attack Graph-Based Probabilistic Security Metric
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
An analysis of CVSS version 2 vulnerability scoring
ESEM '09 Proceedings of the 2009 3rd International Symposium on Empirical Software Engineering and Measurement
Beyond heuristics: learning to classify vulnerabilities and predict exploits
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
An analysis of underground forums
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
SP 800-117. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0
SP 800-117. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0
A large scale exploratory analysis of software vulnerability life cycles
Proceedings of the 34th International Conference on Software Engineering
An independent validation of vulnerability discovery models
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hi-index | 0.00 |