메뉴 건너뛰기




Volumn 2, Issue 2, 2004, Pages 16-21

Susceptibility Matrix: A New Aid to Software Auditing

Author keywords

[No Author keywords available]

Indexed keywords

SOFTWARE AUDITING; SUSCEPTIBILITY MATRIX; TAXONOMY; VULNERABILITIES;

EID: 2342512768     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSECP.2004.1281240     Document Type: Review
Times cited : (13)

References (6)
  • 1
    • 0028514027 scopus 로고
    • A Taxonomy of Computer Program Security Flaws
    • C.E. Landwehr et al., "A Taxonomy of Computer Program Security Flaws," ACM Computing Surveys, vol. 26, no. 3, 1994, pp. 211-254.
    • (1994) ACM Computing Surveys , vol.26 , Issue.3 , pp. 211-254
    • Landwehr, C.E.1
  • 2
    • 0036439885 scopus 로고    scopus 로고
    • Maintaining Software with a Security Perspective
    • IEEE CS Press
    • K. Jiwnani and M. Zelkowitz, "Maintaining Software with a Security Perspective," IEEE Int'l Conf. Software Maintenance, IEEE CS Press, 2002, pp. 194-203.
    • (2002) IEEE Int'l Conf. Software Maintenance , pp. 194-203
    • Jiwnani, K.1    Zelkowitz, M.2
  • 3
    • 0035499176 scopus 로고    scopus 로고
    • Managing Vulnerabilities in Networked Systems
    • R.A. Martin, "Managing Vulnerabilities in Networked Systems," Computer, vol. 34, no. 11, 2001, pp. 32-38.
    • (2001) Computer , vol.34 , Issue.11 , pp. 32-38
    • Martin, R.A.1
  • 5
    • 2342591623 scopus 로고    scopus 로고
    • Software Security for Open-Source Systems
    • C. Cowan, "Software Security for Open-Source Systems," IEEE Security & Privacy, vol. 1, no. 1, 2003, pp. 38-45.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.1 , pp. 38-45
    • Cowan, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.