메뉴 건너뛰기




Volumn 22, Issue 8, 2003, Pages 707-724

The availability of source code in relation to timely response to security vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER SOFTWARE; DATA COMMUNICATION SYSTEMS; ELECTRONIC MAIL; INTERNET; SERVERS;

EID: 0345764830     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(03)00011-7     Document Type: Article
Times cited : (3)

References (14)
  • 3
    • 84976658907 scopus 로고
    • Computer vulnerabilities: Exploitation of avoidance
    • Neumann, P.G., 1995. Computer Vulnerabilities: Exploitation of Avoidance, Communications of the ACM, Vol. 38, No. 6, p. 138.
    • (1995) Communications of the ACM , vol.38 , Issue.6 , pp. 138
    • Neumann, P.G.1
  • 6
    • 47249092647 scopus 로고    scopus 로고
    • Consensus roadmap for defeating distributed denial of service attacks
    • Members of CERT/CC at Carnegie Mellon University, The SANS Institute, and The Center for Education & Research in Information Assurance & Security (CERIAS) at Purdue University, respectively
    • Pethia, R., Paller, A. and Spafford, G., 2000. Consensus Roadmap for Defeating Distributed Denial of Service Attacks. Members of CERT/CC at Carnegie Mellon University, The SANS Institute, and The Center for Education & Research in Information Assurance & Security (CERIAS) at Purdue University, respectively. http://www.sans.org/ddos`roadmap.htm.
    • (2000)
    • Pethia, R.1    Paller, A.2    Spafford, G.3
  • 9
    • 85024253425 scopus 로고    scopus 로고
    • Inside risks: Robust open-source software
    • Neumann, P.G., 1998. Inside Risks: Robust Open-Source Software, Communications of the ACM, Vol. 41, No. 2, p. 128.
    • (1998) Communications of the ACM , vol.41 , Issue.2 , pp. 128
    • Neumann, P.G.1
  • 11
    • 0024684041 scopus 로고
    • With microscope and tweezers: The worm from MIT's perspective
    • Rochilis, J. A. and Eichin, M. W., 1989. With microscope and tweezers: The worm from MIT's perspective, Communications of the ACM, Vol. 32, No. 6, pp. 689-698.
    • (1989) Communications of the ACM , vol.32 , Issue.6 , pp. 689-698
    • Rochilis, J.A.1    Eichin, M.W.2
  • 12
    • 0024681099 scopus 로고
    • Crisis and aftermath
    • Spafford, E. H., 1989. Crisis and aftermath, Communications of the ACM, Vol. 32, No. 6, pp. 678-687.
    • (1989) Communications of the ACM , vol.32 , Issue.6 , pp. 678-687
    • Spafford, E.H.1
  • 13
    • 85030921639 scopus 로고    scopus 로고
    • CERT/CC staff, CERT/CC Statistics 1988-2002, last updated 4 October
    • CERT/CC staff, CERT/CC Statistics 1988-2002, last updated 4 October 2002, http://www.cert.org/stats.
    • (2002)
  • 14
    • 85030920167 scopus 로고    scopus 로고
    • CERT/CC staff, CERT/CC Vulnerability Disclosure Policy
    • CERT/CC staff, CERT/CC Vulnerability Disclosure Policy, 2000, http://www.kb.cert.org/vuls/html/disclosure.
    • (2000)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.