메뉴 건너뛰기




Volumn 3, Issue 4, 2005, Pages 32-41

Handling and reporting security advisories: A scorecard approach

Author keywords

[No Author keywords available]

Indexed keywords

GOAL-QUESTION-METRIC APPROACH; METRICS; SECURITY ADVISORIES; VULNERABILITY;

EID: 24344470236     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2005.98     Document Type: Review
Times cited : (7)

References (13)
  • 1
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • W. Arbaugh, W. Fithen, and J. McHugh, "Windows of Vulnerability: A Case Study Analysis," Computer, vol. 33, no. 12, 2000, pp. 52-59.
    • (2000) Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.1    Fithen, W.2    McHugh, J.3
  • 2
    • 0036898258 scopus 로고    scopus 로고
    • Risk assessment for dummies
    • S. Mash, "Risk Assessment for Dummies," Computer Fraud & Security, vol. 2002, no. 12, 2002, pp. 11-13.
    • (2002) Computer Fraud & Security , vol.2002 , Issue.12 , pp. 11-13
    • Mash, S.1
  • 3
    • 24344497787 scopus 로고    scopus 로고
    • Software patch management - The new frontier
    • L. McGhie, "Software Patch Management - The New Frontier," Secure Business Quarterly, vol. 3, no. 2, 2003.
    • (2003) Secure Business Quarterly , vol.3 , Issue.2
    • McGhie, L.1
  • 5
    • 0030676601 scopus 로고    scopus 로고
    • How to systematically classify computer security intrusions
    • IEEE CS Press
    • U. Lindqvist and E. Jonsson, "How to Systematically Classify Computer Security Intrusions," Proc. 1997 IEEE Symp. Security & Privacy, IEEE CS Press, 1997, pp. 154-163.
    • (1997) Proc. 1997 IEEE Symp. Security & Privacy , pp. 154-163
    • Lindqvist, U.1    Jonsson, E.2
  • 8
    • 0038819499 scopus 로고    scopus 로고
    • A taxonomy for information security technologies
    • H. Venter and J. Eloff, "A Taxonomy for Information Security Technologies," Computers & Security, vol. 22, no. 4, 2003, pp. 299-307.
    • (2003) Computers & Security , vol.22 , Issue.4 , pp. 299-307
    • Venter, H.1    Eloff, J.2
  • 10
    • 0013324190 scopus 로고
    • Risk analysis: An interpretative feasibility tool in justifying information systems security
    • R. Baskerville, "Risk Analysis: An Interpretative Feasibility Tool in Justifying Information Systems Security," European J. Information Systems, vol. 1, no. 2, 1991, pp. 121-130.
    • (1991) European J. Information Systems , vol.1 , Issue.2 , pp. 121-130
    • Baskerville, R.1
  • 13
    • 0036431803 scopus 로고    scopus 로고
    • Trends in academic research: Vulnerabilities analysis and intrusion detection
    • M. Bishop, "Trends in Academic Research: Vulnerabilities Analysis and Intrusion Detection," Computers & Security, vol. 21, no.7, 2002, pp. 609-612.
    • (2002) Computers & Security , vol.21 , Issue.7 , pp. 609-612
    • Bishop, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.