메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Temporal metrics for software vulnerabilities

Author keywords

Common vulnerability scoring system; Information security; Metrics and measurement; Threats and vulnerabilities

Indexed keywords

AUTOMATED SUPPORTS; AUTOMATED TOOLS; COMMON VULNERABILITY SCORING SYSTEM; COMPUTING ENVIRONMENTS; EFFECTIVE TOOLS; FORMAL MODELS; INFORMATION ASSETS; INFORMATION SECURITY; INFORMATION SECURITY PROFESSIONALS; METRICS AND MEASUREMENT; SECURITY CONTROLS; SECURITY METRICS; SOFTWARE VULNERABILITIES; THREATS AND VULNERABILITIES; TIME DEPENDENTS;

EID: 78650760840     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1413140.1413191     Document Type: Conference Paper
Times cited : (13)

References (11)
  • 1
    • 63049087440 scopus 로고    scopus 로고
    • Peter Mell, Karen Scarfone, and Sasha Romanosky, A Complete Guide to the Common Vulnerability Scoring System (CVSS), Version 2.0, Forum of Incident Response and Security Teams, http://www.first.orjr/cvss/cvss-guide.html (July 2007).
    • Peter Mell, Karen Scarfone, and Sasha Romanosky, A Complete Guide to the Common Vulnerability Scoring System (CVSS), Version 2.0, Forum of Incident Response and Security Teams, http://www.first.orjr/cvss/cvss-guide.html (July 2007).
  • 2
    • 63049084996 scopus 로고    scopus 로고
    • Metrics for Information Security Vulnerabilities
    • J. A. Wang, M. Xia, and F. Zhang, "Metrics for Information Security Vulnerabilities, Journal of Applied Global Research, Volume 1, No. 1, 2008, pp. 48-58.
    • (2008) Journal of Applied Global Research , vol.1 , Issue.1 , pp. 48-58
    • Wang, J.A.1    Xia, M.2    Zhang, F.3
  • 3
    • 33947219926 scopus 로고    scopus 로고
    • Information Security Models and Metrics
    • ISBN: 1-59593-059-0. March, Kennesaw, GA
    • rd ACM Southeast Conference, Volume 2, pp. 178 -184. ISBN: 1-59593-059-0. March 2005, Kennesaw, GA.
    • (2005) rd ACM Southeast Conference , vol.2 , pp. 178-184
    • Wang, J.A.1
  • 4
    • 84869243600 scopus 로고    scopus 로고
    • Oracle Corporation
    • Oracle Corporation, The Critical Patch Update, http://www.oracle.com/ technologv/deplov/securitv/critical-patch-updates/cpuoct2006.html.
    • The Critical Patch Update
  • 6
    • 63049119374 scopus 로고    scopus 로고
    • Guide for Developing Performance Metrics for Information Security
    • May
    • Elizabeth Chew et al., Guide for Developing Performance Metrics for Information Security, NIST Special Publication 800-80, May 2006.
    • (2006) NIST Special Publication , vol.800 -80
    • Chew, E.1
  • 7
    • 63049083246 scopus 로고    scopus 로고
    • The SANS Institute, SANS Top-20 2007 Security Risks, http://www.sans.org/ top20/. accessed on February 20, 2008.
    • The SANS Institute, SANS Top-20 2007 Security Risks, http://www.sans.org/ top20/. accessed on February 20, 2008.
  • 8
    • 24944573251 scopus 로고    scopus 로고
    • Security Metrics Guide for Information Technology Systems
    • July
    • Marianne Swanson et al., Security Metrics Guide for Information Technology Systems, NISTSpecial Publication 800-55, July 2003.
    • (2003) NISTSpecial Publication , vol.800 -55
    • Swanson, M.1
  • 9
    • 63049104362 scopus 로고    scopus 로고
    • CISCO Document ID: 100389, http://www.cisco.com/warp/public/707/cisco-sa- 20071219-fwsm.shtml.
    • CISCO Document ID: 100389, http://www.cisco.com/warp/public/707/cisco-sa- 20071219-fwsm.shtml.
  • 10
    • 63049114325 scopus 로고    scopus 로고
    • CISCO Document ID: 100374, http://www.cisco.com/warp/public/707/cisco-sa- 20080326mvpn.shtml.
    • CISCO Document ID: 100374, http://www.cisco.com/warp/public/707/cisco-sa- 20080326mvpn.shtml.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.