-
1
-
-
41449114725
-
Prediction and Entropy NTIS, Springfield, VA
-
MRC Technical Summary Report #2397
-
H. Akaike, Prediction and Entropy NTIS, Springfield, VA, MRC Technical Summary Report #2397, 1982.
-
(1982)
-
-
Akaike, H.1
-
3
-
-
34248348339
-
Measuring, analyzing and predicting security vulnerabilities in software systems
-
May
-
O. H. Alhazmi, Y. K. Malaiya, and I. Ray, "Measuring, analyzing and predicting security vulnerabilities in software systems," Computers and Security Journal, vol. 26, no. 3, pp. 219-228, May 2007.
-
(2007)
Computers and Security Journal
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
Ray, I.3
-
7
-
-
33847328445
-
Libre software as a field of study
-
June
-
J. Amor-Iglesias, J. González-Barahona, G. Robles-Martínez, and I. Herráiz-Tabernero, "Libre software as a field of study," The European Journal for the Informatics Professional, vol. VI, no. 3, pp. 13-16, June 2005.
-
(2005)
The European Journal for the Informatics Professional
, vol.6
, Issue.3
, pp. 13-16
-
-
Amor-Iglesias, J.1
González-Barahona, J.2
Robles-Martínez, G.3
Herráiz-Tabernero, I.4
-
8
-
-
26444448266
-
Security in open versus closed systems - The dance of Boltzmann, Coase and Moore
-
Toulouse, France:, June 20-21
-
R. J. Anderson, "Security in open versus closed systems - The dance of Boltzmann, Coase and Moore," in Open Source Software: Economics, Law and Policy. Toulouse, France:, June 20-21, 2002.
-
(2002)
Open Source Software: Economics, Law and Policy
-
-
Anderson, R.J.1
-
9
-
-
78249276668
-
Timing the application of security patches for optimal uptime
-
November
-
S. Beattie, S. Arnold, C. Cowan, P. Wagle, and C. Wright, "Timing the application of security patches for optimal uptime," in Proc. LISA XVI, November 2002, pp. 233-242.
-
(2002)
Proc. LISA XVI
, pp. 233-242
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
-
10
-
-
0030410990
-
A conservative theory for longterm reliability growth prediction
-
Dec
-
P. G. Bishop and R. E. Bloomfield, "A conservative theory for longterm reliability growth prediction," IEEE Trans. Reliability, vol. 45, no. 4, pp. 550-560, Dec. 1996.
-
(1996)
IEEE Trans. Reliability
, vol.45
, Issue.4
, pp. 550-560
-
-
Bishop, P.G.1
Bloomfield, R.E.2
-
11
-
-
12344266250
-
Murphy's law, the fitness of evolving species, and the limits of software reliability Cambridge University Computer Laboratory
-
Technical Report No. 471, September, Online, Available
-
R. M. Brady, R. J. Anderson, and R. C. Ball, Murphy's law, the fitness of evolving species, and the limits of software reliability Cambridge University Computer Laboratory, Technical Report No. 471, September 1999 [Online]. Available: http://www.cl.cam.ac.uk/ftp/users/rja14/babtr.pdf
-
(1999)
-
-
Brady, R.M.1
Anderson, R.J.2
Ball, R.C.3
-
12
-
-
0034823003
-
A trend analysis of exploitation
-
May
-
H. K. Browne, W. A. Arbaugh, J. McHugh, and W. L. Fithen, "A trend analysis of exploitation," in Proc. IEEE Symposium on Security a Privacy, 2001, May 2001, pp. 214-229.
-
(2001)
Proc. IEEE Symposium on Security a Privacy, 2001
, pp. 214-229
-
-
Browne, H.K.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
13
-
-
0037244529
-
-
B. Brykczynski and R. A. Small, Reducing internet-based intrusion Effective security patch management, IEEE Software, 20, no. pp. 50-57, Jan./Feb. 2003.
-
B. Brykczynski and R. A. Small, "Reducing internet-based intrusion Effective security patch management," IEEE Software, vol. 20, no. pp. 50-57, Jan./Feb. 2003.
-
-
-
-
14
-
-
0018505572
-
Time-dependent error detection rat model for software and other performance measures
-
August
-
A. L. Goel and K. Okumoto, "Time-dependent error detection rat model for software and other performance measures," IEEE Trans. on Reliability, vol. R-28, no. 3, pp. 206-211, August 1979.
-
(1979)
IEEE Trans. on Reliability
, vol.R-28
, Issue.3
, pp. 206-211
-
-
Goel, A.L.1
Okumoto, K.2
-
15
-
-
41449097529
-
-
Online, Available
-
NVD Metabase July 2006 [Online]. Available: http://nvd.nist.gov
-
(2006)
-
-
-
16
-
-
41449088477
-
-
Handbook of Software Reliability Engineering, M. R. Lyu, Ed., McGraw-Hill, 1995.
-
"Handbook of Software Reliability Engineering," M. R. Lyu, Ed., McGraw-Hill, 1995.
-
-
-
-
17
-
-
0027694035
-
An examination of fault exposure ratio
-
Nov
-
Y. K. Malaiya, A. von Mayrhauser, and P. K. Srimani, "An examination of fault exposure ratio," IEEE Trans. Software Engineering, pp. 1087-1094, Nov. 1993.
-
(1993)
IEEE Trans. Software Engineering
, pp. 1087-1094
-
-
Malaiya, Y.K.1
von Mayrhauser, A.2
Srimani, P.K.3
-
18
-
-
2342581753
-
From the ground up: The DIMACS software security workshop
-
March/April
-
G. McGraw, "From the ground up: The DIMACS software security workshop," IEEE Security & Privacy, vol. 1, no. 2, pp. 59-66, March/April 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.2
, pp. 59-66
-
-
McGraw, G.1
-
19
-
-
41449090334
-
-
The MITRE Corporation, February, Online, Available
-
The MITRE Corporation, February 2005 [Online]. Available: www.mitre.org
-
(2005)
-
-
-
21
-
-
0021208648
-
A logarithmic Poisson execution time model for software reliability measurement
-
Orlando, FL
-
J. D. Musa and K. Okumoto, "A logarithmic Poisson execution time model for software reliability measurement," in Proc. 7th International Conference on Software Engineering, Orlando, FL, 1984, pp. 230-238.
-
(1984)
Proc. 7th International Conference on Software Engineering
, pp. 230-238
-
-
Musa, J.D.1
Okumoto, K.2
-
22
-
-
84877999984
-
Milk or wine: Does software security improve with age?
-
Vancouver, BC, July 31-August 4
-
A. Ozment and S. E. Schechter, "Milk or wine: Does software security improve with age?," in The 15th USENIX Security Symposium, Vancouver, BC, July 31-August 4 2006.
-
(2006)
The 15th USENIX Security Symposium
-
-
Ozment, A.1
Schechter, S.E.2
-
23
-
-
14744276335
-
Is finding security holes a good idea?
-
Jan./Feb
-
E. Rescola, "Is finding security holes a good idea?," Security and Privacy, pp. 14-19, Jan./Feb. 2005.
-
(2005)
Security and Privacy
, pp. 14-19
-
-
Rescola, E.1
-
24
-
-
26444582561
-
-
LAwrence Livermore National Laboratory, July 23, 1990 [Online, Available
-
E. E. Schultz, Jr., D. S. Brown, and T. A. Longstaff, Responding Computer Security Incidents. :LAwrence Livermore National Laboratory, July 23, 1990 [Online]. Available: Ftp://ftp.cert.dfn.de/pub/docs/csir/ ihg.ps.gz
-
Responding Computer Security Incidents
-
-
Schultz Jr., E.E.1
Brown, D.S.2
Longstaff, T.A.3
|