-
1
-
-
26444582561
-
-
Lawrence Livermore National Laboratory, Livermore, CA
-
E. E. Schultz, D. S. Brown, and T. A. Longstaff, Responding to Computer Security Incidents: Guidelines for Incident Handling, Lawrence Livermore National Laboratory, Livermore, CA, 1990.
-
(1990)
Responding to Computer Security Incidents: Guidelines for Incident Handling
-
-
Schultz, E.E.1
Brown, D.S.2
Longstaff, T.A.3
-
2
-
-
26444448266
-
Security in open versus closed systems - The dance of boltzmann, coase and moore
-
R. Anderson, "Security in open versus closed systems - the dance of boltzmann, coase and moore," in Proc. Open Source Software: Economics, Law, and Policy Confocuce, June 2002.
-
Proc. Open Source Software: Economics, Law, and Policy Confocuce, June 2002
-
-
Anderson, R.1
-
3
-
-
34248370608
-
Large-scale vulnerability analysis
-
S. Frei, M. May, U. Fiedler, and B. Plattner, "Large-scale vulnerability analysis," in Proc. 2006 SIGCOMM workshop on Large-Scale Attack Defense, September 2006, pp. 131-138.
-
Proc. 2006 SIGCOMM Workshop on Large-Scale Attack Defense, September 2006
, pp. 131-138
-
-
Frei, S.1
May, M.2
Fiedler, U.3
Plattner, B.4
-
4
-
-
63349105320
-
0-day patch exposing vendors (in) security performance
-
S. Frei, B. Tellenbach, and B. Plattner, "0-day patch exposing vendors (in) security performance," in Proc. Black Hat Technical Security Conf. , vol. 14, 2009.
-
(2009)
Proc. Black Hat Technical Security Conf.
, vol.14
-
-
Frei, S.1
Tellenbach, B.2
Plattner, B.3
-
6
-
-
14744276335
-
Is finding security holes a good idea?
-
Januray
-
E. Rescorla, "Is finding security holes a good idea?" IEEE Security and Privacy, vol. 3, no. 1, pp. 14-19, Januray 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 14-19
-
-
Rescorla, E.1
-
7
-
-
77954250852
-
An empirical analysis of software vendors patch release behavior: Impact of vulnerability disclosure
-
A. Arora, R. Krishnan, R. Telang, and Y. Yang, "An empirical analysis of software vendors patch release behavior: Impact of vulnerability disclosure," Information Systems Research, vol. 21, no. 1, pp. 115-132, 2010.
-
(2010)
Information Systems Research
, vol.21
, Issue.1
, pp. 115-132
-
-
Arora, A.1
Krishnan, R.2
Telang, R.3
Yang, Y.4
-
8
-
-
77649179868
-
Competition and patching of security vulnerabilities: An empirical analysis
-
A. Arora, C. Forman, A. Nandkumar, and R. Telang, "Competition and patching of security vulnerabilities: An empirical analysis," Information Economics and Policy, vol. 22, no. 2, pp. 164-177, 2010.
-
(2010)
Information Economics and Policy
, vol.22
, Issue.2
, pp. 164-177
-
-
Arora, A.1
Forman, C.2
Nandkumar, A.3
Telang, R.4
-
13
-
-
0035532141
-
Estimating the number of clusters in a data set via the gap statistic
-
R. Tibshirani, G. Walther, and T. Hastie, "Estimating the number of clusters in a data set via the gap statistic," Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol. 63, no. 2, pp. 411-423, 2001.
-
(2001)
Journal of the Royal Statistical Society: Series B (Statistical Methodology)
, vol.63
, Issue.2
, pp. 411-423
-
-
Tibshirani, R.1
Walther, G.2
Hastie, T.3
-
15
-
-
0003957032
-
-
Citeseer
-
I. H. Witten, E. Frank, L. Trigg, M. Hall, G. Holmes, and S. J. Cunningham, Weka: Practical Machine Learning Tools and Techniques with Java Implementations. Citeseer, 1999.
-
(1999)
Weka: Practical Machine Learning Tools and Techniques with Java Implementations
-
-
Witten, I.H.1
Frank, E.2
Trigg, L.3
Hall, M.4
Holmes, G.5
Cunningham, S.J.6
-
16
-
-
78751477710
-
Familiarity breeds contempt: The honeymoon effect and the role of legacy code in zero-day vulnerabilities
-
S. Clark, S. Frei, M. Blaze, and J. Smith, "Familiarity breeds contempt: The honeymoon effect and the role of legacy code in zero-day vulnerabilities," in Proc. 26th Int. Annual Computer Security Applications Conf. , 2010, pp. 251-260.
-
Proc. 26th Int. Annual Computer Security Applications Conf., 2010
, pp. 251-260
-
-
Clark, S.1
Frei, S.2
Blaze, M.3
Smith, J.4
-
17
-
-
79959888787
-
Empirical results on the study of software vulnerabilities: NIER track
-
Y. Wu, H. Siy, and R. Gandhi, "Empirical results on the study of software vulnerabilities: NIER track," in Proc. 33rd Int. Conf. on Software Engineering, 2011, pp. 964-967.
-
Proc. 33rd Int. Conf. on Software Engineering, 2011
, pp. 964-967
-
-
Wu, Y.1
Siy, H.2
Gandhi, R.3
-
19
-
-
34547100991
-
An empirical analysis of the impact of software vulnerability announcements on firm stock price
-
R. Telang and S. Wattal, "An empirical analysis of the impact of software vulnerability announcements on firm stock price," IEEE Transactions on Software Engineering, vol. 33, no. 8, pp. 544-557, 2007.
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
20
-
-
71249135127
-
A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors
-
G. Schryen, "A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors," in Proc. 5th Int. Conf. on IT Security Incident Management and IT Forensics, 2009, pp. 153-168.
-
Proc. 5th Int. Conf. on IT Security Incident Management and IT Forensics, 2009
, pp. 153-168
-
-
Schryen, G.1
-
22
-
-
77956214438
-
Beyond heuristics: Learning to classify vulnerabilities and predict exploits
-
M. Bozorgi, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond heuristics: Learning to classify vulnerabilities and predict exploits," in Proc. of 16th Int. Conf. on Knowledge discovery and data mining, 2010, pp. 105-114.
-
Proc. of 16th Int. Conf. on Knowledge Discovery and Data Mining, 2010
, pp. 105-114
-
-
Bozorgi, M.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
|