메뉴 건너뛰기




Volumn 26, Issue 3, 2007, Pages 219-228

Measuring, analyzing and predicting security vulnerabilities in software systems

Author keywords

Defect density; Quantitative security modeling; Risk evaluation; Security holes; Vulnerabilities

Indexed keywords

COMPUTER OPERATING SYSTEMS; DEFECT DENSITY; MATHEMATICAL MODELS; PROJECT MANAGEMENT; RISK ANALYSIS; SOFTWARE TESTING;

EID: 34248348339     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.10.002     Document Type: Article
Times cited : (192)

References (29)
  • 1
    • 27744556127 scopus 로고    scopus 로고
    • Alhazmi OH, Malaiya YK. Quantitative vulnerability assessment of systems software. In: Proceedings of 51st annual reliability and maintainability symposium, Alexandria, VA; January 2005. p. 615-20.
  • 2
    • 33750962700 scopus 로고    scopus 로고
    • Alhazmi OH, Malaiya YK. Modeling the vulnerability discovery process. In: International Symposium on Software Reliability Engineering; November 2005.
  • 3
    • 26444516466 scopus 로고    scopus 로고
    • Alhazmi OH, Malaiya YK, Ray I. Security vulnerabilities in software systems: a quantitative perspective. In: Proceedings of IFIP WG 11.3 working conference on data and applications security; August 2005. p. 281-94.
  • 4
    • 0347104960 scopus 로고
    • Assessing computer security vulnerability
    • Alves-Foss J., and Barbosa S. Assessing computer security vulnerability. Operating Systems Review 29 3 (1995) 3-13
    • (1995) Operating Systems Review , vol.29 , Issue.3 , pp. 3-13
    • Alves-Foss, J.1    Barbosa, S.2
  • 5
    • 34248375122 scopus 로고    scopus 로고
    • Anderson Ross. Security in open versus closed systems-the dance of Boltzmann, Coase and Moore. In: Conference on open source software: economics, law and policy, Toulouse, France; June 2002. p. 1-15, http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf.
  • 6
    • 0034501876 scopus 로고    scopus 로고
    • Windows of vulnerability: a case study analysis
    • Arbaugh W.A., Fithen W.L., and McHugh J. Windows of vulnerability: a case study analysis. IEEE Computer 33 12 (December 2000) 52-59
    • (2000) IEEE Computer , vol.33 , Issue.12 , pp. 52-59
    • Arbaugh, W.A.1    Fithen, W.L.2    McHugh, J.3
  • 8
    • 0034823003 scopus 로고    scopus 로고
    • Browne HK, Arbaugh WA, McHugh J, Fithen WL. A trend analysis of exploitation. In: Proceedings of the IEEE Symposium on Security and Privacy; May 2001. p. 214-29.
  • 9
    • 0037244529 scopus 로고    scopus 로고
    • Reducing internet-based intrusions: effective security patch management
    • Brykczynski B., and Small R.A. Reducing internet-based intrusions: effective security patch management. IEEE Software 20 1 (January-February 2003) 50-57
    • (2003) IEEE Software , vol.20 , Issue.1 , pp. 50-57
    • Brykczynski, B.1    Small, R.A.2
  • 11
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker behavior
    • Jonsson E., and Olovsson T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 24 3 (April 1997) 235-245
    • (1997) IEEE Transactions on Software Engineering , vol.24 , Issue.3 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 14
    • 0036926468 scopus 로고    scopus 로고
    • Madan BB, Goseva-Popstojanova K, Vaidyanathan K, Trivedi KS. Modeling and quantification of security attributes of software systems. In: Proceedings of the IEEE international performance and dependability symposium (IPDS 2002); June 2002.
  • 15
    • 0031336792 scopus 로고    scopus 로고
    • Malaiya YK, Denton J. What do the software reliability growth model parameters represent? In: International symposium on software reliability engineering; 1997. p. 124-35.
  • 16
    • 0034542613 scopus 로고    scopus 로고
    • Malaiya YK, Denton J. Module size distribution and defect density. In: Proceedings of the IEEE international symposium on software reliability engineering; October 2000. p. 62-71.
  • 17
    • 2342581753 scopus 로고    scopus 로고
    • From the ground up: the DIMACS software security workshop
    • McGraw G. From the ground up: the DIMACS software security workshop. IEEE Security & Privacy 1 2 (March/April 2003) 59-66
    • (2003) IEEE Security & Privacy , vol.1 , Issue.2 , pp. 59-66
    • McGraw, G.1
  • 19
    • 4544225763 scopus 로고    scopus 로고
    • Mohagheghi P, Conradi R, Killi OM, Schwarz H. An empirical study of software reuse vs. defect-density. In: Proceedings of the 26th international conference on software engineering; May 2004. p. 282-91.
  • 21
    • 34248325941 scopus 로고    scopus 로고
    • National Vulnerability Database; February 2005. .
  • 26
    • 14744276335 scopus 로고    scopus 로고
    • Is finding security holes a good idea?
    • Rescorla E. Is finding security holes a good idea?. Economics of Information Security 3 1 (January-February 2005) 14-19
    • (2005) Economics of Information Security , vol.3 , Issue.1 , pp. 14-19
    • Rescorla, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.