메뉴 건너뛰기




Volumn , Issue , 2005, Pages 615-620

Quantitative vulnerability assessment of systems software

Author keywords

Operating systems; Quantitative models; Security; Vulnerability

Indexed keywords

CONTROL ACCESS; DEFECT DENSITIES; SOFTWARE RELIABILITY; EQUIVALENT EFFORT; QUANTITATIVE MODELS; SECURITY; VULNERABILITY;

EID: 27744556127     PISSN: 0149144X     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (106)

References (17)
  • 7
    • 2542607810 scopus 로고    scopus 로고
    • Quantitative assessment of operational security: Models and tools
    • LAAS Report 96493, May
    • M. Dacier, Y. Deswarte and M. Kaâniche, Quantitative Assessment of Operational Security: Models and Tools, Technical Report, LAAS Report 96493, May 1996.
    • (1996) Technical Report
    • Dacier, M.1    Deswarte, Y.2    Kaâniche, M.3
  • 9
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: A case study analysis
    • December
    • W. A. Arbaugh, W. L. Fithen, J. McHugh, "Windows of Vulnerability: A Case Study Analysis", IEEE Computer, Vol. 33, No. 12, pp. 52-59, December 2000.
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 11
    • 27744506995 scopus 로고    scopus 로고
    • Developing a probabilistic security measure using a software reliability model
    • October
    • C.Y. Shim, R.E. Gantenbein, and S.Y. Shin, "Developing a Probabilistic Security Measure Using a Software Reliability Model", Information, October 2001, pp. 409-418.
    • (2001) Information , pp. 409-418
    • Shim, C.Y.1    Gantenbein, R.E.2    Shin, S.Y.3
  • 12
    • 27744476858 scopus 로고    scopus 로고
    • Vulnerabilities in major operating systems
    • Computer Science Department, Colorado State University
    • O. H. Alhazmi, Y. K. Malaiya, I. Ray, Vulnerabilities in Major Operating Systems, Technical Report, Computer Science Department, Colorado State University, 2004.
    • (2004) Technical Report
    • Alhazmi, O.H.1    Malaiya, Y.K.2    Ray, I.3
  • 13
    • 27744583699 scopus 로고    scopus 로고
    • September 12
    • ICAT Metabase, http://icat.nist.gov/icat.cfm, September 12, 2004.
    • (2004) ICAT Metabase
  • 14
    • 27744470261 scopus 로고
    • Software reliability models: Theoretical development, evaluation and applications
    • Y. K. Malaiya, P. K. Srimani, "Software Reliability Models: Theoretical Development, Evaluation and Applications", IEEE Computer Society Press, 1990.
    • (1990) IEEE Computer Society Press
    • Malaiya, Y.K.1    Srimani, P.K.2
  • 15
    • 2342581753 scopus 로고    scopus 로고
    • From the ground up: The DIMACS software security workshop
    • March/April
    • G. McGraw. "From the Ground Up: The DIMACS Software Security Workshop", IEEE Security & Privacy. March/April 2003. Volume 1, Number 2. pp. 59-66.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.2 , pp. 59-66
    • McGraw, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.