메뉴 건너뛰기




Volumn 23, Issue 9-10, 2010, Pages 16-20

Studying software vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

LARGE PROJECT; RESEARCH EFFORTS; SOFTWARE PROJECT; SOFTWARE VULNERABILITIES;

EID: 77956769752     PISSN: None     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (11)
  • 3
    • 77956726534 scopus 로고    scopus 로고
    • The MITRE corporation
    • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component." 5 Apr.
    • The MITRE corporation. CWE- Common Weakness Enumeration. "CWE- 74: Improper Neutralization of Special Elements in Output Used by a Downstream Component." 5 Apr. 2010 .
    • (2010) CWE- Common Weakness Enumeration
  • 4
    • 77956733147 scopus 로고    scopus 로고
    • The MITRE corporation
    • CWE- 79: Improper Neutralization of Input During Web Page Generation." 5 Apr.
    • The MITRE corporation. CWE- Common Weakness Enumeration. "CWE- 79: Improper Neutralization of Input During Web Page Generation." 5 Apr. 2010.
    • CWE- Common Weakness Enumeration , vol.2010
  • 5
    • 77956732738 scopus 로고    scopus 로고
    • The MITRE corporation
    • CVE- 2007-5000 (under review)." 9 Sept.
    • The MITRE corporation. CVE- Common Vulnerabilities and Exposures. "CVE-2007-5000 (under review)." 9 Sept. 2007.
    • (2007) CVE- Common Vulnerabilities and Exposures
  • 6
    • 77954606254 scopus 로고    scopus 로고
    • Proc. of the 6th International Workshop on Software Engineering for Secure Systems (SESS '10) at the 32nd International Conference on Software Engineering (ICSE 2010), South Africa, Cape Town.
    • Wu, Yan, Robin A. Gandhi, and Harvey Siy. Using Semantic Templates to Study Vulnerabilities Recorded in Large Software Repositories. Proc. of the 6th International Workshop on Software Engineering for Secure Systems (SESS '10) at the 32nd International Conference on Software Engineering (ICSE 2010), South Africa, Cape Town. 2010.
    • (2010) Using Semantic Templates to Study Vulnerabilities Recorded in Large Software Repositories
    • Wu, Y.1    Robin, A.G.2    Harvey, S.3
  • 11


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.