-
3
-
-
33846152122
-
-
CERT, emergency response team coordination center
-
CERT, "Computer emergency response team coordination center," http://www.cert.org/.
-
Computer
-
-
-
4
-
-
84870666315
-
-
SF, "Securityfocus," http://www.securityfocus.com/.
-
Securityfocus
-
-
SF1
-
8
-
-
84925838576
-
-
R. Anderson, Why information security is hard-an economic perspective, In Proceedings of 17th Annual Computer Security Applications Conference (ACSAC), 2001.
-
R. Anderson, "Why information security is hard-an economic perspective," In Proceedings of 17th Annual Computer Security Applications Conference (ACSAC), 2001.
-
-
-
-
11
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
W. A. Arbaugh, W. L. Fithen, and J. McHugh, "Windows of vulnerability: A case study analysis," IEEE Computer, vol. 33, 2000.
-
(2000)
IEEE Computer
, vol.33
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
12
-
-
38149097274
-
Impact of vulnerability disclosure and patch availability - empirical analysis
-
Ashish Arora, Ramayya Krishnan, Anand Nandkumar, Rahul Telang, and Yubao Yang, "Impact of vulnerability disclosure and patch availability - empirical analysis," in Proceedings of the Third Annual Workshop on Economics and Information Security (WEIS04), 2004.
-
(2004)
Proceedings of the Third Annual Workshop on Economics and Information Security (WEIS04)
-
-
Arora, A.1
Krishnan, R.2
Nandkumar, A.3
Telang, R.4
Yang, Y.5
-
13
-
-
34248332447
-
An empirical analysis of vendor response to disclosure policy
-
Tech. Rep, Carnegie Mellon University, March
-
Ashish Arora, Ramayya Krishnan, Rahul Telang, and Yubao Yang, "An empirical analysis of vendor response to disclosure policy," Tech. Rep., Carnegie Mellon University, March 2005.
-
(2005)
-
-
Arora, A.1
Krishnan, R.2
Telang, R.3
Yang, Y.4
-
14
-
-
34248343713
-
Empirical analysis of software vendors patching behavior, impact of vulnerability disclosure
-
Tech. Rep, Carnegie Mellon University, Jan
-
Ashish Arora, Ramayya Krishnan, Rahul Telang, and Yubao Yang, "Empirical analysis of software vendors patching behavior, impact of vulnerability disclosure," Tech. Rep., Carnegie Mellon University, Jan 2006.
-
(2006)
-
-
Arora, A.1
Krishnan, R.2
Telang, R.3
Yang, Y.4
-
15
-
-
34248365096
-
Laws of vulnerabilities
-
Qualys Research Report
-
Qualys Research Report, 2005, "Laws of vulnerabilities," http://www.qualys.com/docs/Laws-Report.pdf, 2005.
-
(2005)
-
-
-
17
-
-
34248341660
-
-
Hasan Cavusoglu, Huseyin Cavusoglu, and S. Raghunathan, Emerging issues in responsible vulnerability disclosure, in In the proceedings of WITS 2004, 2004.
-
Hasan Cavusoglu, Huseyin Cavusoglu, and S. Raghunathan, "Emerging issues in responsible vulnerability disclosure," in In the proceedings of WITS 2004, 2004.
-
-
-
-
19
-
-
34248399876
-
-
Full Disclosure, Full disclosure mailing list, http://lists.grok.org.uk/full-disclosure-charter.html.
-
Full Disclosure, "Full disclosure mailing list," http://lists.grok.org.uk/full-disclosure-charter.html.
-
-
-
-
20
-
-
19944429098
-
-
Bruce Schneier, The nonsecurity of secrecy, in Communications of the ACM v. 47, 2004, p. 120, ? 2004.
-
Bruce Schneier, "The nonsecurity of secrecy," in Communications of the ACM v. 47, 2004, p. 120, ? 2004.
-
-
-
-
23
-
-
34248361410
-
-
NGS
-
NGS, "Ngs software," http://www.ngssoftware.com/advisory.htm.
-
Ngs software
-
-
-
24
-
-
27544447936
-
eeye digital security
-
eEye, "eeye digital security," http://www.eeye.com/html/ research/advisories/index.html.
-
-
-
eEye1
-
25
-
-
34248386022
-
idefense
-
iDefense, "idefense," http://www.idefense.com/intelligence/ vulnerabilities/.
-
-
-
iDefense1
-
26
-
-
34248360211
-
-
milw0rm, Milw0rm exploit archive, http://www.milw0rm.com.
-
milw0rm, "Milw0rm exploit archive," http://www.milw0rm.com.
-
-
-
|