-
2
-
-
0036116939
-
On the security of open source software
-
C. Payne, "On the security of open source software", Information Systems Journal (12:1), 2002, pp. 61-78.
-
(2002)
Information Systems Journal
, vol.12
, Issue.1
, pp. 61-78
-
-
Payne, C.1
-
4
-
-
72949118195
-
-
E. Levy, "Wide open source", http://www.securityfocus.com/news/ 19, 2000.
-
(2000)
Wide open source
, pp. 19
-
-
Levy, E.1
-
6
-
-
34547666862
-
-
O.H. Alhazmi and Y.K. Malaiya, Measuring and enhancing prediction capabilities of vulnerability discovery models for Apache and IIS HTTP servers, in: Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE'06), Washington, DC, USA, 2006, pp. 343-352.
-
O.H. Alhazmi and Y.K. Malaiya, "Measuring and enhancing prediction capabilities of vulnerability discovery models for Apache and IIS HTTP servers", in: Proceedings of the 17th International Symposium on Software Reliability Engineering (ISSRE'06), Washington, DC, USA, 2006, pp. 343-352.
-
-
-
-
7
-
-
34248348339
-
Measuring, analyzing and predicting security vulnerabilities in software systems
-
O. Alhazmi, Y. Malaiya, and I. Ray, "Measuring, analyzing and predicting security vulnerabilities in software systems", Computers & Security (26:3), 2007, pp. 219-228.
-
(2007)
Computers & Security
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.1
Malaiya, Y.2
Ray, I.3
-
8
-
-
34248370608
-
Large-Scale Vulnerability Analysis
-
Workshop, November 11, Pisa, Italy
-
S. Frei, M. May, U. Fiedler B. Plattner, "Large-Scale Vulnerability Analysis, in: Proceedings of the ACM SIGCOMM 2006 Workshop, November 11, 2006, Pisa, Italy.
-
(2006)
Proceedings of the ACM SIGCOMM
-
-
Frei, S.1
May, M.2
Fiedler, U.3
Plattner, B.4
-
9
-
-
71249090651
-
A trend analysis of vulnerabilities
-
Technical Report 2005-05, CERIAS, Purdue University, May
-
R. Gopalakrishna and E.H. Spafford, "A trend analysis of vulnerabilities", Technical Report 2005-05, CERIAS, Purdue University, May 2005.
-
(2005)
-
-
Gopalakrishna, R.1
Spafford, E.H.2
-
10
-
-
67249126825
-
Predicting Vulnerable Software Components
-
Alexandria, VA, USA, October
-
S. Neuhaus, T. Zimmermann, C. Holler and A. Zeller, "Predicting Vulnerable Software Components", in: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, USA, October 2007, pp. 529-540.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
11
-
-
38049138451
-
An analysis of the vulnerability discovery process in web browsers
-
Dallas, TX, USA, November 13-15
-
S.-W. Woo, O.H. Alhazmi, and Y.K. Malaiya, "An analysis of the vulnerability discovery process in web browsers", in: Proceedings of the 10th IASTED International Conference on Software Engineering and Applications, Dallas, TX, USA, November 13-15, 2006.
-
(2006)
Proceedings of the 10th IASTED International Conference on Software Engineering and Applications
-
-
Woo, S.-W.1
Alhazmi, O.H.2
Malaiya, Y.K.3
-
12
-
-
36949009222
-
-
S.-W.Woo, O.H. Alhazmi Y.K. Malaiya, Assessing vulnerabilities in Apache and IIS HTTP servers, in: Proceedings of the 2nd International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, IN, USA, September 29-October 01, 2006, pp. 103-110.
-
S.-W.Woo, O.H. Alhazmi Y.K. Malaiya, "Assessing vulnerabilities in Apache and IIS HTTP servers, in: Proceedings of the 2nd International Symposium on Dependable, Autonomic and Secure Computing, Indianapolis, IN, USA, September 29-October 01, 2006, pp. 103-110.
-
-
-
-
14
-
-
84870378281
-
Security of open source and closed source software: An empirical comparison of published vulnerabilities
-
San Francisco, California, August 6, 9
-
G. Schryen, "Security of open source and closed source software: An empirical comparison of published vulnerabilities", in: Proceedings of Americas Conference on Information Systems, San Francisco, California, August 6 - 9, 2009.
-
(2009)
Proceedings of Americas Conference on Information Systems
-
-
Schryen, G.1
-
15
-
-
67650336989
-
The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting
-
Cambridge, Massachusetts, June 2-3
-
A. Ozment, "The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting", in: Proceedings of the Fourth Workshop on the Economics of Information Security, Cambridge, Massachusetts, June 2-3, 2005, pp. 1-21.
-
(2005)
Proceedings of the Fourth Workshop on the Economics of Information Security
, pp. 1-21
-
-
Ozment, A.1
-
16
-
-
71249133040
-
-
Open Source Initiative (OSI), The Open Source Definition, http://www.opensource.org/docs/osd, 2006.
-
Open Source Initiative (OSI), "The Open Source Definition", http://www.opensource.org/docs/osd, 2006.
-
-
-
-
18
-
-
0037840250
-
-
Free Software Foundation FSF
-
Free Software Foundation (FSF), "The Free Software Definition", http://www.fsf.org/licensing/essays/free-sw.html, 2007.
-
(2007)
The Free Software Definition
-
-
-
19
-
-
71249148719
-
Open Source vs. Closed Source Software: Towards Measuring Security
-
Honolulu, Hawaii, March 8-12
-
G. Schryen and R. Kadura, "Open Source vs. Closed Source Software: Towards Measuring Security", in: Proceedings of the 2009 ACM Symposium on Applied Computing, Honolulu, Hawaii, March 8-12, 2009, pp. 2016-2023.
-
(2009)
Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 2016-2023
-
-
Schryen, G.1
Kadura, R.2
-
20
-
-
84925838576
-
Why Information Security is Hard - An Economic Perspective
-
New Orleans, Louisiana, December 10-14
-
R. Anderson, "Why Information Security is Hard - An Economic Perspective", in: Proceedings of the Seventeenth Computer Security Applications Conference, New Orleans, Louisiana, December 10-14, 2001, pp. 358-365.
-
(2001)
Proceedings of the Seventeenth Computer Security Applications Conference
, pp. 358-365
-
-
Anderson, R.1
-
22
-
-
71249098465
-
-
A. Ozment, Improving Vulnerability Discovery Models: Problems with Definitions and Assumptions, in: Proceedings of the Third Workshop on Quality of Protection (QoP'07), Alexandria, VA, USA. October 29, 2007.
-
A. Ozment, "Improving Vulnerability Discovery Models: Problems with Definitions and Assumptions", in: Proceedings of the Third Workshop on Quality of Protection (QoP'07), Alexandria, VA, USA. October 29, 2007.
-
-
-
-
24
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
W.A. Arbaugh, W.L. Fithen and J. McHugh, "Windows of vulnerability: A case study analysis", IEEE Computer (33:12), 2000, pp. 52-59.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
26
-
-
38149097274
-
Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis
-
Minneapolis, Minnesota, May 13-14
-
A. Arora, R. Krishnan, A. Nandkumar, R. Telang, and Y. Yang, "Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis", in: Proceedings of the Third Workshop on the Economics of Information Security, Minneapolis, Minnesota, May 13-14, 2004, pp. 1-20.
-
(2004)
Proceedings of the Third Workshop on the Economics of Information Security
, pp. 1-20
-
-
Arora, A.1
Krishnan, R.2
Nandkumar, A.3
Telang, R.4
Yang, Y.5
-
27
-
-
33846588487
-
To disclose or not? An analysis of software user behavior
-
D. Nizovtsev and M. Thursby, "To disclose or not? An analysis of software user behavior", Information Economics and Policy (19:1), 2007, pp. 43-64.
-
(2007)
Information Economics and Policy
, vol.19
, Issue.1
, pp. 43-64
-
-
Nizovtsev, D.1
Thursby, M.2
-
28
-
-
33646141892
-
Optimal Policy for Software Vulnerability Disclosure
-
Minneapolis, Minnesota, May 13-14
-
A. Arora, A. Telang, and H. Xu, "Optimal Policy for Software Vulnerability Disclosure", in: Proceedings of the Third Annual Workshop on Economics and Information Security, Minneapolis, Minnesota, May 13-14, 2004, pp. 52-59.
-
(2004)
Proceedings of the Third Annual Workshop on Economics and Information Security
, pp. 52-59
-
-
Arora, A.1
Telang, A.2
Xu, H.3
-
30
-
-
71249108731
-
Competitive and strategic effects in the timing of patch release
-
Cambridge, UK, June 26-28
-
A. Arora, C.M. Forman, A. Nandkumar, and R. Telang, "Competitive and strategic effects in the timing of patch release", in Proceedings of the Fifth Workshop on the Economics of Information Security, Cambridge, UK, June 26-28, 2006.
-
(2006)
Proceedings of the Fifth Workshop on the Economics of Information Security
-
-
Arora, A.1
Forman, C.M.2
Nandkumar, A.3
Telang, R.4
-
31
-
-
72849122477
-
Economics of Security Patch Management
-
Cambridge, UK, June 26-28
-
H. Cavusoglu, H. Cavusoglu, and J. Zhang, "Economics of Security Patch Management", in: Proceedings of the Fifth Workshop on the Economics of Information Security, Cambridge, UK, June 26-28, 2006.
-
(2006)
Proceedings of the Fifth Workshop on the Economics of Information Security
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Zhang, J.3
-
32
-
-
78249276668
-
Timing the Application of Security Patches for Optimal Uptime
-
Philadelphia, Pennsylvania, November 3-8
-
S. Beattie, S. Arnold, C. Cowan, P. Wagle, C. Wright, and A. Shostack, "Timing the Application of Security Patches for Optimal Uptime", in: Proceedings of Sixteenth Systems Administration Conference, Philadelphia, Pennsylvania, November 3-8, 2002, pp. 233-242.
-
(2002)
Proceedings of Sixteenth Systems Administration Conference
, pp. 233-242
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
Shostack, A.6
-
33
-
-
67650336988
-
Open and Closed Systems are Equivalent (that is, in an ideal world)
-
Feller, J, B. Fitzgerald, S.A. Hissam, and K.R. Lakhani Eds, MIT Press, Cambridge
-
R. Anderson, "Open and Closed Systems are Equivalent (that is, in an ideal world)", in: Perspectives on Free and Open Source Software, Feller, J., B. Fitzgerald, S.A. Hissam, and K.R. Lakhani (Eds.), MIT Press, Cambridge, 2005, pp. 127-142.
-
(2005)
Perspectives on Free and Open Source Software
, pp. 127-142
-
-
Anderson, R.1
-
34
-
-
71249102810
-
-
NetApplications, Global Market Share Statistics, http://marketshare.hitslink.com, 2009.
-
NetApplications, "Global Market Share Statistics, http://marketshare.hitslink.com, 2009.
-
-
-
-
35
-
-
71249091991
-
-
Netcraft, "Web Server Survey", http://news.netcraft.com/ archives/web-server-survey.html, 2009.
-
(2009)
Web Server Survey
-
-
-
37
-
-
71249100936
-
-
NIST, Personal communication with C. Johnson, National Vulnerability Database - Program Manager, Computer Security Division Personal communication, May 2009.
-
NIST, Personal communication with C. Johnson, National Vulnerability Database - Program Manager, Computer Security Division Personal communication, May 2009.
-
-
-
-
38
-
-
38549172280
-
-
NIST, National
-
NIST, National Vulnerability Database, http://nvd.nist.gov, 2009.
-
(2009)
Vulnerability Database
-
-
|