-
4
-
-
41449117969
-
Application of vulnerability discovery models to major operating systems
-
O.H. Alhazmi, and Y.K. Malaiya Application of vulnerability discovery models to major operating systems IEEE Transactions on Reliability March 2008 14 22
-
(2008)
IEEE Transactions on Reliability
, pp. 14-22
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
-
5
-
-
34248348339
-
Measuring, analyzing and predicting security vulnerabilities in software systems
-
O.H. Alhazmi, Y.K. Malaiya, and I. Ray Measuring, analyzing and predicting security vulnerabilities in software systems Computers & Security 26 3 May 2007 219 228
-
(2007)
Computers & Security
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
Ray, I.3
-
6
-
-
0038443107
-
A new taxonomy of web attacks suitable for efficient encoding
-
10.1016/S0167-4048(03)00512-1 ISSN: 0167-4048
-
G. Alvarez, and Slobodan Petrovic A new taxonomy of web attacks suitable for efficient encoding Computers & Security 22 5 July 2003 435 449 10.1016/S0167-4048(03)00512-1 ISSN: 0167-4048
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 435-449
-
-
Alvarez, G.1
Petrovic, S.2
-
7
-
-
26444448266
-
Security in open versus closed systems - The dance of Boltzmann, Coase and Moore
-
Anderson R. Security in open versus closed systems - the dance of Boltzmann, Coase and Moore. In: Conf. on open source software: economics, law and policy; 2002. p. 1-15.
-
(2002)
Conf. on Open Source Software: Economics, Law and Policy
, pp. 1-15
-
-
Anderson, R.1
-
10
-
-
79251597484
-
-
BEA Systems
-
BEA Systems http://www.bea.com April 2010
-
(2010)
-
-
-
12
-
-
0025419850
-
Recalibrating software reliability models
-
S. Brocklehurst, P.Y. Chan, B. Littewood, and J. Snell Recalibrating software reliability models IEEE Transactions on Software Engineering 16 4 1990 456 470
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.4
, pp. 456-470
-
-
Brocklehurst, S.1
Chan, P.Y.2
Littewood, B.3
Snell, J.4
-
15
-
-
67650108546
-
The life and death of statically detected vulnerabilities: An empirical study
-
M. Di Penta, L. Cerulo, and L. Aversano The life and death of statically detected vulnerabilities: an empirical study Information and Software Technology 51 10 October 2009 1469 1484
-
(2009)
Information and Software Technology
, vol.51
, Issue.10
, pp. 1469-1484
-
-
Di Penta, M.1
Cerulo, L.2
Aversano, L.3
-
22
-
-
0031099876
-
Reexamining the fault density-component size connection
-
L. Hatton Reexamining the fault density-component size connection IEEE Software March 1997 89 97
-
(1997)
IEEE Software
, pp. 89-97
-
-
Hatton, L.1
-
23
-
-
79251599473
-
-
IIS vs. Apache
-
IIS vs. Apache, Looking Beyond the Rhetoric http://www.serverwatch.com/ tutorials/article.php/3074841 April 2010
-
(2010)
Looking Beyond the Rhetoric
-
-
-
32
-
-
2342581753
-
From the ground up: The DIMACS software security workshop
-
G. McGraw From the ground up: the DIMACS software security workshop IEEE Security and Privacy 1 2 March/April 2003 59 66
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.2
, pp. 59-66
-
-
McGraw, G.1
-
33
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
Moore D, Shannon C, Claffy KC. Code-red: a case study on the spread and victims of an internet worm. In: Internet measurement workshop; 2002. p. 273-84.
-
(2002)
Internet Measurement Workshop
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.C.3
-
36
-
-
79251596794
-
-
Netcraft http://news.netcraft.com/ April 2010
-
(2010)
-
-
-
37
-
-
79251600564
-
-
National Vulnerability Database (NVD) http://nvd.nist.gov/ April 2010
-
(2010)
-
-
-
38
-
-
79251598705
-
-
Oracle WebLogic Server http://www.oracle.com/technology/products/ Weblogic/index.html April 2010
-
(2010)
-
-
-
39
-
-
79251593074
-
-
Open Source Vulnerability Database (OSVDB) http://osvdb.org April 2010
-
(2010)
-
-
-
42
-
-
14744276335
-
Is finding security holes a good idea?
-
E. Rescorla Is finding security holes a good idea? IEEE Security and Privacy 2005 14 19
-
(2005)
IEEE Security and Privacy
, pp. 14-19
-
-
Rescorla, E.1
-
46
-
-
79251595785
-
-
Secunia http://secunia.com/ April 2010
-
(2010)
-
-
-
47
-
-
79251596406
-
-
Securityfocus http://www.securityfocus.com/ April 2010
-
(2010)
-
-
-
48
-
-
79251593604
-
-
SLOCCount
-
SLOCCount http://dwheeler.com/sloccount April 2010
-
(2010)
-
-
-
49
-
-
49849085708
-
Standardizing vulnerability categories
-
10.1016/j.cose.2008.04.002 ISSN: 0167-4048
-
H.S. Venter, J.H.P. Eloff, and Y.L. Li Standardizing vulnerability categories Computers & Security 27 3-4 May-June 2008 71 83 10.1016/j.cose.2008.04.002 ISSN: 0167-4048
-
(2008)
Computers & Security
, vol.27
, Issue.34
, pp. 71-83
-
-
Venter, H.S.1
Eloff, J.H.P.2
Li, Y.L.3
|