메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 129-138

Modeling the vulnerability discovery process

Author keywords

[No Author keywords available]

Indexed keywords

SOFTWARE DEFECTS; SOFTWARE DEVELOPERS; SOFTWARE TESTING; VULNERABILITY DISCOVERY PROCESS;

EID: 33750962700     PISSN: 10719458     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSRE.2005.30     Document Type: Conference Paper
Times cited : (96)

References (20)
  • 5
    • 26444448266 scopus 로고    scopus 로고
    • Security in opens versus closed systems - The dance of boltzmann, coase and moore
    • Toulouse, France, June 20-21
    • R. J. Anderson, "Security in Opens versus Closed Systems - The Dance of Boltzmann, Coase and Moore," Open Source Software: Economics, Law and Policy, Toulouse, France, June 20-21, 2002.
    • (2002) Open Source Software: Economics, Law and Policy
    • Anderson, R.J.1
  • 6
    • 78249276668 scopus 로고    scopus 로고
    • Timing the application of security patches for optimal uptime
    • November
    • S. Beattie, S. Arnold, C. Cowan, P. Wagle and C. Wright, "Timing the Application of Security Patches for Optimal Uptime," Proc. LISA XVI, November 2002. pp 233-242.
    • (2002) Proc. LISA XVI , pp. 233-242
    • Beattie, S.1    Arnold, S.2    Cowan, C.3    Wagle, P.4    Wright, C.5
  • 7
    • 0030410990 scopus 로고    scopus 로고
    • A conservative theory for long-term reliability growth prediction
    • Dec.
    • P. G. Bishop and R. E. Bloomfield, "A Conservative Theory for Long-Term Reliability Growth Prediction," IEEE Trans. Reliability, Vol. 45, No. 4, Dec. 1996. pp
    • (1996) IEEE Trans. Reliability , vol.45 , Issue.4
    • Bishop, P.G.1    Bloomfield, R.E.2
  • 10
    • 0037244529 scopus 로고    scopus 로고
    • Reducing internet-based intrusions: Effective security patch management
    • Jan-Feb
    • B. Brykczynski and R. A. Small, "Reducing Internet-Based Intrusions: Effective Security Patch Management,", IEEE Software, Vol. 20, No. 1, Jan-Feb 2003, pp. 50-57
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 50-57
    • Brykczynski, B.1    Small, R.A.2
  • 11
    • 0018505572 scopus 로고
    • Time-dependent error detection rate model for software and other performance measures
    • August
    • A. L. Goel and K. Okumoto, "Time-Dependent Error Detection Rate Model for Software and Other Performance Measures," IEEE Trans. on Reliability, R-28, 3, August 1979, pp. 206-211.
    • (1979) IEEE Trans. on Reliability , vol.R-28 , Issue.3 , pp. 206-211
    • Goel, A.L.1    Okumoto, K.2
  • 12
    • 27744583699 scopus 로고    scopus 로고
    • February
    • ICAT Metabase, http://icat.nist.gov/icat.cfm, February 2004.
    • (2004) ICAT Metabase
  • 15
    • 2342581753 scopus 로고    scopus 로고
    • From the ground up: The DIMACS software security workshop
    • Number 2, March/April
    • G. McGraw. "From the Ground Up: The DIMACS Software Security Workshop," IEEE Security & Privacy. Volume 1, Number 2, March/April 2003, pp. 59-66.
    • (2003) IEEE Security & Privacy , vol.1 , pp. 59-66
    • McGraw, G.1
  • 16
    • 84860018549 scopus 로고    scopus 로고
    • February
    • The MITRE Corporation, www.mitre.org, February 2005.
    • (2005)
  • 18
    • 0021208648 scopus 로고
    • A logarithmic Poisson execution time model for software reliability measurement
    • Orlando, FL
    • J.D. Musa and K. Okumoto, "A logarithmic Poisson execution time model for software reliability measurement," Proc. 7th International Conference on Software Engineering, Orlando, FL, 1984, pp. 230-238.
    • (1984) Proc. 7th International Conference on Software Engineering , pp. 230-238
    • Musa, J.D.1    Okumoto, K.2
  • 19
    • 14744276335 scopus 로고    scopus 로고
    • Is finding security holes a good idea?
    • Jan-Feb
    • E. Rescola, "Is finding security holes a good idea?" Security and Privacy, Jan-Feb 2005. pp. 14-19.
    • (2005) Security and Privacy , pp. 14-19
    • Rescola, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.