-
1
-
-
33745473819
-
-
Tech. rep, Open Web Application Security Project OWASP
-
A. Kumar, Phishing - a new age weapon. Tech. rep., Open Web Application Security Project (OWASP), 2005.
-
(2005)
Phishing - a new age weapon
-
-
Kumar, A.1
-
2
-
-
13244277801
-
-
E. E. Schultz, Internet Explorer Security: is there any hope? Network Security, 2005, issue 1,1 (Jan. 2005), pp 6-10.
-
E. E. Schultz, Internet Explorer Security: is there any hope? Network Security, Vol. 2005, issue 1,1 (Jan. 2005), pp 6-10.
-
-
-
-
5
-
-
79251599734
-
Securing your web browser
-
Tech. rep, CERT Coordination Center
-
W. Dormann, and J. Rafail, Securing your web browser. Tech. rep., CERT Coordination Center, 2006.
-
(2006)
-
-
Dormann, W.1
Rafail, J.2
-
6
-
-
38049164890
-
-
B. Krebs, Real world impact of IE flaw, Brian Krebs on Computer Security, http://blog.washingtonpost.com /securityfix/2006/04/ real_world_impact_of_internet_1.html, Posted April 3, 2006.
-
B. Krebs, Real world impact of IE flaw, Brian Krebs on Computer Security, http://blog.washingtonpost.com /securityfix/2006/04/ real_world_impact_of_internet_1.html, Posted April 3, 2006.
-
-
-
-
9
-
-
26444448266
-
Security in open versus closed systems - the dance of Boltzmann, Coase and Moore
-
R. Anderson, Security in open versus closed systems - the dance of Boltzmann, Coase and Moore. In Conf. on Open Source Software: Economics, Law and Policy (2002), pp. 1-15.
-
(2002)
Conf. on Open Source Software: Economics, Law and Policy
, pp. 1-15
-
-
Anderson, R.1
-
11
-
-
27744556127
-
Quantitative Vulnerability Assessment of Systems Software
-
Alexandria, Virginia, U.S.A, January 23-27
-
O. H. Alhazmi and Y. K. Malaiya, "Quantitative Vulnerability Assessment of Systems Software," Proceedings of 51st Reliability and Maintainability Symposium, Alexandria, Virginia, U.S.A, January 23-27 2005 .pp. 615-621.
-
(2005)
Proceedings of 51st Reliability and Maintainability Symposium
, pp. 615-621
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
-
13
-
-
34250212150
-
Prediction Capabilities of Vulnerability Discovery Models
-
Newport Beach, California, January 23-26
-
O. H. Alhazmi and Y. K. Malaiya, "Prediction Capabilities of Vulnerability Discovery Models," Proceedings of 52nd Reliability and Maintainability Symposium, Newport Beach, California, January 23-26 2006, pp.86-91.
-
(2006)
Proceedings of 52nd Reliability and Maintainability Symposium
, pp. 86-91
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
-
14
-
-
38049133634
-
-
National Vulnerability Database, April
-
National Vulnerability Database, http://nvd.nist.gov/, April 2006.
-
(2006)
-
-
-
15
-
-
38049097288
-
-
April
-
Net Applications, http://www.netapplications.com/, April 2006.
-
(2006)
Net Applications
-
-
-
16
-
-
33947317857
-
-
October
-
SLOCCount,http://www.dwheeler.com/sloccount/,October2006
-
(2006)
SLOCCount
-
-
-
17
-
-
2442463532
-
Use of a taxonomy of security faults
-
T. Aslam, I. Krsul, and E. Spafford, "Use of a taxonomy of security faults," in Proc. 19th NIST-NCSC Nat. Information Systems Security Conf, 1996, pp. 551-560.
-
(1996)
Proc. 19th NIST-NCSC Nat. Information Systems Security Conf
, pp. 551-560
-
-
Aslam, T.1
Krsul, I.2
Spafford, E.3
-
19
-
-
38049122734
-
Vulnerability likelihood: A probabilistic approach to software assurance
-
CERIAS
-
R. Gopalakrishna, E. Spafford, and J. Vitek, Vulnerability likelihood: a probabilistic approach to software assurance. Tech rep., CERIAS, 2005
-
(2005)
Tech rep
-
-
Gopalakrishna, R.1
Spafford, E.2
Vitek, J.3
-
20
-
-
0028514027
-
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, A taxonomy of computer program security flaws. ACM Comput. Surv. 26, 3 (1994), pp. 211-254.
-
(1994)
A taxonomy of computer program security flaws. ACM Comput. Surv
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
21
-
-
38049143363
-
-
R. C. Seacord, and A. D. Householder, Structured approach to classifying vulnerabilities. Tech rep., CMU/SE1-2005-TN-003, Carnegie Mellon, 2005.
-
R. C. Seacord, and A. D. Householder, Structured approach to classifying vulnerabilities. Tech rep., CMU/SE1-2005-TN-003, Carnegie Mellon, 2005.
-
-
-
-
22
-
-
38049155211
-
-
E. E. Schultz, D. S. Brown, and T. Longstaff A. Responding to computer security incidents. Tech rep., Lawrence Livemore National Laboratory, July 1990.
-
E. E. Schultz, D. S. Brown, and T. Longstaff A. Responding to computer security incidents. Tech rep., Lawrence Livemore National Laboratory, July 1990.
-
-
-
-
23
-
-
38049164888
-
-
April
-
Secunia, http://secunia.com/, April 2006.
-
(2006)
Secunia
-
-
|