메뉴 건너뛰기




Volumn , Issue , 2012, Pages 5564-5573

Effort estimates for vulnerability discovery projects

Author keywords

[No Author keywords available]

Indexed keywords

SYSTEMS SCIENCE;

EID: 84857973207     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2012.238     Document Type: Conference Paper
Times cited : (17)

References (33)
  • 1
    • 59449108823 scopus 로고    scopus 로고
    • U.S.D. of C. NIST Computer Security Resource Center
    • U.S.D. of C. NIST Computer Security Resource Center, "National Vulnerability Database," 2011.
    • (2011) National Vulnerability Database
  • 3
    • 79251599901 scopus 로고    scopus 로고
    • Modeling vulnerability discovery process in Apache and IIS HTTP servers
    • Jan.
    • S.-W. Woo, H. Joh, O.H. Alhazmi, and Y.K. Malaiya, "Modeling vulnerability discovery process in Apache and IIS HTTP servers," Computers & Security, vol. 30, Jan. 2011, pp. 50-62.
    • (2011) Computers & Security , vol.30 , pp. 50-62
    • Woo, S.-W.1    Joh, H.2    Alhazmi, O.H.3    Malaiya, Y.K.4
  • 6
    • 38149037931 scopus 로고    scopus 로고
    • TU Delft expert judgment data base
    • May.
    • R. Cooke, "TU Delft expert judgment data base," Reliability Engineering & System Safety, vol. 93, May. 2008, pp. 657-674.
    • (2008) Reliability Engineering & System Safety , vol.93 , pp. 657-674
    • Cooke, R.1
  • 8
    • 2342591623 scopus 로고    scopus 로고
    • Software security for open-source systems
    • C. Cowan, "Software security for open-source systems," Security & Privacy, IEEE, vol. 1, 2003, p. 38-45.
    • (2003) Security & Privacy, IEEE , vol.1 , pp. 38-45
    • Cowan, C.1
  • 12
    • 84870043937 scopus 로고    scopus 로고
    • Software vulnerabilities: Open source versus proprietary software security
    • S. Sridhar and K. Altinkemer, "Software Vulnerabilities: Open Source versus Proprietary Software Security," AMCIS 2005 Proceedings, 2005.
    • (2005) AMCIS 2005 Proceedings
    • Sridhar, S.1    Altinkemer, K.2
  • 13
    • 0036116939 scopus 로고    scopus 로고
    • On the security of open source software
    • Jan.
    • C. Payne, "On the security of open source software," Information Systems Journal, vol. 12, Jan. 2002, pp. 61-78.
    • (2002) Information Systems Journal , vol.12 , pp. 61-78
    • Payne, C.1
  • 15
    • 67650108546 scopus 로고    scopus 로고
    • The life and death of statically detected vulnerabilities: An empirical study
    • Oct.
    • M.D. Penta, L. Cerulo, and L. Aversano, "The life and death of statically detected vulnerabilities: An empirical study," Information and Software Technology, vol. 51, Oct. 2009, pp. 1469-1484.
    • (2009) Information and Software Technology , vol.51 , pp. 1469-1484
    • Penta, M.D.1    Cerulo, L.2    Aversano, L.3
  • 16
    • 84857944225 scopus 로고    scopus 로고
    • A systematic literature review of actionable alert identification techniques for automated static code analysis
    • S. Heckman and L. Williams, "A systematic literature review of actionable alert identification techniques for automated static code analysis," Information and Software Technology, 2010.
    • (2010) Information and Software Technology
    • Heckman, S.1    Williams, L.2
  • 17
    • 70450223307 scopus 로고    scopus 로고
    • Filtering false alarms of buffer overflow analysis using SMT solvers
    • Feb.
    • Y. Kim, J. Lee, H. Han, and K.-M. Choe, "Filtering false alarms of buffer overflow analysis using SMT solvers," Information and Software Technology, vol. 52, Feb. 2010, pp. 210-219.
    • (2010) Information and Software Technology , vol.52 , pp. 210-219
    • Kim, Y.1    Lee, J.2    Han, H.3    Choe, K.-M.4
  • 20
    • 0032839653 scopus 로고    scopus 로고
    • Combining probability distributions from experts in risk analysis
    • R.T. Clemen and R.L. Winkler, "Combining probability distributions from experts in risk analysis," Risk Analysis, vol. 19, 1999, pp. 187-204.
    • (1999) Risk Analysis , vol.19 , pp. 187-204
    • Clemen, R.T.1    Winkler, R.L.2
  • 23
    • 84857938990 scopus 로고    scopus 로고
    • Elsevier B.V.
    • Elsevier B.V., "Scopus," 2011.
    • (2011) Scopus
  • 24
  • 25
    • 85133422303 scopus 로고    scopus 로고
    • Mail survey response behavior: A conceptualization of motivating factors and an empirical study
    • S.T. Cavusgil and L.A. Elvey-Kirk, "Mail survey response behavior: A conceptualization of motivating factors and an empirical study," European Journal of Marketing, vol. 32, 1998, p. 1165-1192.
    • (1998) European Journal of Marketing , vol.32 , pp. 1165-1192
    • Cavusgil, S.T.1    Elvey-Kirk, L.A.2
  • 29
    • 84993790580 scopus 로고    scopus 로고
    • My current thoughts on coefficient alpha and successor procedures
    • Jun.
    • L.J. Cronbach and R.J. Shavelson, "My Current Thoughts on Coefficient Alpha and Successor Procedures," Educational and Psychological Measurement, vol. 64, Jun. 2004, pp. 391-418.
    • (2004) Educational and Psychological Measurement , vol.64 , pp. 391-418
    • Cronbach, L.J.1    Shavelson, R.J.2
  • 30
    • 33845945922 scopus 로고
    • Coefficient alpha and the internal structure of tests
    • L.J. Cronbach, "Coefficient alpha and the internal structure of tests," Psychometrika, vol. 16, 1951, p. 297-334.
    • (1951) Psychometrika , vol.16 , pp. 297-334
    • Cronbach, L.J.1
  • 31
    • 38149131299 scopus 로고    scopus 로고
    • A study of expert overconfidence
    • May.
    • S. Lin, "A study of expert overconfidence," Reliability Engineering & System Safety, vol. 93, May. 2008, pp. 711-721.
    • (2008) Reliability Engineering & System Safety , vol.93 , pp. 711-721
    • Lin, S.1
  • 33
    • 84857980438 scopus 로고    scopus 로고
    • SecurityFocus
    • SecurityFocus, "SecurityFocus," 2011.
    • (2011) SecurityFocus


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.