-
1
-
-
59449108823
-
-
U.S.D. of C. NIST Computer Security Resource Center
-
U.S.D. of C. NIST Computer Security Resource Center, "National Vulnerability Database," 2011.
-
(2011)
National Vulnerability Database
-
-
-
3
-
-
79251599901
-
Modeling vulnerability discovery process in Apache and IIS HTTP servers
-
Jan.
-
S.-W. Woo, H. Joh, O.H. Alhazmi, and Y.K. Malaiya, "Modeling vulnerability discovery process in Apache and IIS HTTP servers," Computers & Security, vol. 30, Jan. 2011, pp. 50-62.
-
(2011)
Computers & Security
, vol.30
, pp. 50-62
-
-
Woo, S.-W.1
Joh, H.2
Alhazmi, O.H.3
Malaiya, Y.K.4
-
4
-
-
67349139935
-
On the secure software development process: CLASP, SDL and Touchpoints compared
-
Jul.
-
B. De Win, R. Scandariato, K. Buyens, J. Gregoire, and W. Joosen, "On the secure software development process: CLASP, SDL and Touchpoints compared," Information and Software Technology, vol. 51, Jul. 2009, pp. 1152-1171.
-
(2009)
Information and Software Technology
, vol.51
, pp. 1152-1171
-
-
De Win, B.1
Scandariato, R.2
Buyens, K.3
Gregoire, J.4
Joosen, W.5
-
6
-
-
38149037931
-
TU Delft expert judgment data base
-
May.
-
R. Cooke, "TU Delft expert judgment data base," Reliability Engineering & System Safety, vol. 93, May. 2008, pp. 657-674.
-
(2008)
Reliability Engineering & System Safety
, vol.93
, pp. 657-674
-
-
Cooke, R.1
-
7
-
-
78650423222
-
Empirical estimates and observations of 0day vulnerabilities
-
IEEE
-
M.A. McQueen, T.A. McQueen, W.F. Boyer, and M.R. Chaffin, "Empirical estimates and observations of 0day vulnerabilities," System Sciences, 2009. HICSS' 09. 42nd Hawaii International Conference on, IEEE, 2009, p. 1-12.
-
(2009)
System Sciences, 2009. HICSS' 09. 42nd Hawaii International Conference on
, pp. 1-12
-
-
McQueen, M.A.1
McQueen, T.A.2
Boyer, W.F.3
Chaffin, M.R.4
-
8
-
-
2342591623
-
Software security for open-source systems
-
C. Cowan, "Software security for open-source systems," Security & Privacy, IEEE, vol. 1, 2003, p. 38-45.
-
(2003)
Security & Privacy, IEEE
, vol.1
, pp. 38-45
-
-
Cowan, C.1
-
11
-
-
67249126825
-
Predicting vulnerable software components
-
New York, New York, USA: ACM
-
S. Neuhaus, T. Zimmermann, C. Holler, and A. Zeller, "Predicting vulnerable software components," Proceedings of the 14th ACM conference on Computer and communications security, New York, New York, USA: ACM, 2007, p. 529-540.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
12
-
-
84870043937
-
Software vulnerabilities: Open source versus proprietary software security
-
S. Sridhar and K. Altinkemer, "Software Vulnerabilities: Open Source versus Proprietary Software Security," AMCIS 2005 Proceedings, 2005.
-
(2005)
AMCIS 2005 Proceedings
-
-
Sridhar, S.1
Altinkemer, K.2
-
13
-
-
0036116939
-
On the security of open source software
-
Jan.
-
C. Payne, "On the security of open source software," Information Systems Journal, vol. 12, Jan. 2002, pp. 61-78.
-
(2002)
Information Systems Journal
, vol.12
, pp. 61-78
-
-
Payne, C.1
-
14
-
-
85084164164
-
Cyclone: A safe dialect of C
-
Monterrey, CA, USA
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang, "Cyclone: A safe dialect of C," USENIX, Monterrey, CA, USA: 2002, pp. 275-288.
-
(2002)
USENIX
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
15
-
-
67650108546
-
The life and death of statically detected vulnerabilities: An empirical study
-
Oct.
-
M.D. Penta, L. Cerulo, and L. Aversano, "The life and death of statically detected vulnerabilities: An empirical study," Information and Software Technology, vol. 51, Oct. 2009, pp. 1469-1484.
-
(2009)
Information and Software Technology
, vol.51
, pp. 1469-1484
-
-
Penta, M.D.1
Cerulo, L.2
Aversano, L.3
-
16
-
-
84857944225
-
A systematic literature review of actionable alert identification techniques for automated static code analysis
-
S. Heckman and L. Williams, "A systematic literature review of actionable alert identification techniques for automated static code analysis," Information and Software Technology, 2010.
-
(2010)
Information and Software Technology
-
-
Heckman, S.1
Williams, L.2
-
17
-
-
70450223307
-
Filtering false alarms of buffer overflow analysis using SMT solvers
-
Feb.
-
Y. Kim, J. Lee, H. Han, and K.-M. Choe, "Filtering false alarms of buffer overflow analysis using SMT solvers," Information and Software Technology, vol. 52, Feb. 2010, pp. 210-219.
-
(2010)
Information and Software Technology
, vol.52
, pp. 210-219
-
-
Kim, Y.1
Lee, J.2
Han, H.3
Choe, K.-M.4
-
18
-
-
33344478479
-
Software effort estimation terminology: The tower of Babel
-
Apr.
-
S. Grimstad, M. Jorgensen, and K. Molokken-Ostvold, "Software effort estimation terminology: The tower of Babel," Information and Software Technology, vol. 48, Apr. 2006, pp. 302-310.
-
(2006)
Information and Software Technology
, vol.48
, pp. 302-310
-
-
Grimstad, S.1
Jorgensen, M.2
Molokken-Ostvold, K.3
-
19
-
-
84857204174
-
A complete guide to the common vulnerability scoring system version 2.0
-
P. Mell, K. Scarfone, and S. Romanosky, "A complete guide to the common vulnerability scoring system version 2.0," Published by FIRST-Forum of Incident Response and Security Teams, 2007, pp. 1-23.
-
(2007)
Published by FIRST-Forum of Incident Response and Security Teams
, pp. 1-23
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
20
-
-
0032839653
-
Combining probability distributions from experts in risk analysis
-
R.T. Clemen and R.L. Winkler, "Combining probability distributions from experts in risk analysis," Risk Analysis, vol. 19, 1999, pp. 187-204.
-
(1999)
Risk Analysis
, vol.19
, pp. 187-204
-
-
Clemen, R.T.1
Winkler, R.L.2
-
23
-
-
84857938990
-
-
Elsevier B.V.
-
Elsevier B.V., "Scopus," 2011.
-
(2011)
Scopus
-
-
-
25
-
-
85133422303
-
Mail survey response behavior: A conceptualization of motivating factors and an empirical study
-
S.T. Cavusgil and L.A. Elvey-Kirk, "Mail survey response behavior: A conceptualization of motivating factors and an empirical study," European Journal of Marketing, vol. 32, 1998, p. 1165-1192.
-
(1998)
European Journal of Marketing
, vol.32
, pp. 1165-1192
-
-
Cavusgil, S.T.1
Elvey-Kirk, L.A.2
-
26
-
-
0003457608
-
-
New York, NY, USA: John Wiley & Sons
-
H. Kerzner, Project management: a systems approach to planning, scheduling, and controlling, New York, NY, USA: John Wiley & Sons, 2001.
-
(2001)
Project Management: A Systems Approach to Planning, Scheduling, and Controlling
-
-
Kerzner, H.1
-
28
-
-
20444457583
-
Statistical methods for eliciting probability distributions
-
P.H. Garthwaite, J.B. Kadane, and A. O' Hagan, "Statistical methods for eliciting probability distributions," Journal of the American Statistical Association, vol. 100, 2005, pp. 680-701.
-
(2005)
Journal of the American Statistical Association
, vol.100
, pp. 680-701
-
-
Garthwaite, P.H.1
Kadane, J.B.2
O'Hagan, A.3
-
29
-
-
84993790580
-
My current thoughts on coefficient alpha and successor procedures
-
Jun.
-
L.J. Cronbach and R.J. Shavelson, "My Current Thoughts on Coefficient Alpha and Successor Procedures," Educational and Psychological Measurement, vol. 64, Jun. 2004, pp. 391-418.
-
(2004)
Educational and Psychological Measurement
, vol.64
, pp. 391-418
-
-
Cronbach, L.J.1
Shavelson, R.J.2
-
30
-
-
33845945922
-
Coefficient alpha and the internal structure of tests
-
L.J. Cronbach, "Coefficient alpha and the internal structure of tests," Psychometrika, vol. 16, 1951, p. 297-334.
-
(1951)
Psychometrika
, vol.16
, pp. 297-334
-
-
Cronbach, L.J.1
-
31
-
-
38149131299
-
A study of expert overconfidence
-
May.
-
S. Lin, "A study of expert overconfidence," Reliability Engineering & System Safety, vol. 93, May. 2008, pp. 711-721.
-
(2008)
Reliability Engineering & System Safety
, vol.93
, pp. 711-721
-
-
Lin, S.1
-
32
-
-
0003457608
-
-
New York, NY, USA: John Wiley & Sons
-
H. Kerzner, Project management: a systems approach to planning, scheduling, and controlling, New York, NY, USA: John Wiley & Sons, 2001.
-
(2001)
Project Management: A Systems Approach to Planning, Scheduling, and Controlling
-
-
Kerzner, H.1
-
33
-
-
84857980438
-
-
SecurityFocus
-
SecurityFocus, "SecurityFocus," 2011.
-
(2011)
SecurityFocus
-
-
|