|
Volumn 83, Issue 4, 2006, Pages 256-261
|
Software vulnerability: Definition, modelling, and practical evaluation for e-mail transfer software
|
Author keywords
Malicious users; Nonhomogeneous Poisson process; Software reliability; Software vulnerability
|
Indexed keywords
COMPUTER CRIME;
ELECTRONIC MAIL;
INPUT OUTPUT PROGRAMS;
RANDOM PROCESSES;
RELIABILITY THEORY;
SECURITY OF DATA;
ELECTRONIC MAIL TRANSFER SOFTWARE;
NONHOMOGENEOUS POISSON PROCESS;
SECURITY-HOLE DATA;
SENDMAIL SYSTEM;
SOFTWARE RELIABILITY;
SOFTWARE VULNERABILITTY;
COMPUTER SOFTWARE;
COMPUTER CRIME;
COMPUTER SOFTWARE;
ELECTRONIC MAIL;
INPUT OUTPUT PROGRAMS;
RANDOM PROCESSES;
RELIABILITY THEORY;
SECURITY OF DATA;
|
EID: 33646512647
PISSN: 03080161
EISSN: None
Source Type: Journal
DOI: 10.1016/j.ijpvp.2006.02.003 Document Type: Article |
Times cited : (14)
|
References (3)
|