-
3
-
-
78651070465
-
The common vulnerability scoring system (CVSS) and its applicability to federal agency systems
-
P. Mell, K. Scarfone, and S. Romanosky. The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems. NIST Interagency Report 7435, 2007.
-
(2007)
NIST Interagency Report 7435
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
4
-
-
84893310403
-
Common platform enumeration: Naming specification version 2.3
-
Maryland, USA, NIST Interagency Report 7695
-
B. A. Cheikes, D. Waltermire, and K. Scarfone. Common Platform Enumeration: Naming Specification Version 2.3. National Institute of Standards and Technology, Maryland, USA, 2011. NIST Interagency Report 7695.
-
(2011)
National Institute of Standards and Technology
-
-
Cheikes, B.A.1
Waltermire, D.2
Scarfone, K.3
-
5
-
-
79961035117
-
Analyzing inter-application communication in android
-
Chin E, Felt AP, Greenwood K, et al. Analyzing inter-application communication in android. The International Conference on Mobile Systems, Applications, and Services(MobiSys), 2011.
-
(2011)
The International Conference on Mobile Systems, Applications, and Services(MobiSys)
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
-
6
-
-
84937693847
-
ITU-T. Language for the open definition of vulnerabilities and for the assessment of a system state. International telecommunications union, geneva, Switzerland
-
ITU-T. Language for the open definition of vulnerabilities and for the assessment of a system state. International Telecommunications Union, Geneva, Switzerland, 2014. ITU-T Recommendation X.1526.
-
(2014)
ITU-T Recommendation X.1526
-
-
-
9
-
-
62349121390
-
Specification for the extensible configuration checklist description format (XCCDF) version 1.1.4
-
N. Ziring, and S. D. Quinn. Specification for the Extensible Configuration Checklist Description Format (XCCDF) version 1.1.4. NIST Interagency Report 7275 Revision 3, 2008.
-
(2008)
NIST Interagency Report 7275 Revision 3
-
-
Ziring, N.1
Quinn, S.D.2
-
11
-
-
84937704779
-
IEEE ICSG malware metadata exchange format working group
-
IEEE ICSG Malware Metadata Exchange Format Working Group. Malware Metadata Exchange Format Version 1.2, 2014. http://grouper.ieee.org/groups/malware/malwg/Schema1.2/.
-
(2014)
Malware Metadata Exchange Format Version 1.2
-
-
-
12
-
-
84937686404
-
The MITRE corporation
-
The MITRE Corporation. Making Security Measurable. http://msm.mitre.org/2014.
-
(2014)
Making Security Measurable
-
-
-
13
-
-
84937717820
-
National institute of standards and technology
-
National Institute of Standards and Technology. National Vulnerability Database (NVD). http://nvd.nist.gov/2011.
-
(2011)
National Vulnerability Database (NVD)
-
-
-
15
-
-
84937703814
-
Red hat inc
-
Red Hat Inc. Security Measurement. https://www.redhat.com/security/data/metrics/2014.
-
(2014)
Security Measurement
-
-
-
17
-
-
79960858157
-
Resource description framework (RDF): Concepts and abstract syntax
-
G. Klyne, and J. J. Carroll. Resource Description Framework (RDF): Concepts and Abstract Syntax. The World Wide Web Consortium, 2004.
-
(2004)
The World Wide Web Consortium
-
-
Klyne, G.1
Carroll, J.J.2
-
18
-
-
84961677194
-
Technical considerations for vetting 3rd party mobile applications (Draft)
-
Maryland, USA, NIST special publication
-
Voas J, Quirolgico S, Michael C, et al. Technical Considerations for Vetting 3rd Party Mobile Applications (Draft). National Institute of Standards and Technology, Maryland, USA, 2014. NIST special publication 800-163.
-
(2014)
National Institute of Standards and Technology
, pp. 163-800
-
-
Voas, J.1
Quirolgico, S.2
Michael, C.3
-
21
-
-
84937679887
-
-
NetAgent Co. Ltd. Secroid. http://secroid.jp, 2014.
-
(2014)
NetAgent Co. Ltd
-
-
-
22
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Zhou Y, Wang Z, Zhou W, et al. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. The Network and Distributed System Securiy Symposium(NDSS), 2012.
-
(2012)
The Network and Distributed System Securiy Symposium(NDSS)
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
-
23
-
-
84864334986
-
Riskranker: Scalable and accurate zero-day android malware detection
-
Grace M, Zhou Y, Zhang Q, et al. Riskranker: Scalable and accurate zero-day android malware detection. The International Conference on Mobile Systems, Applications, and Services(MobiSys), 2012.
-
(2012)
The International Conference on Mobile Systems, Applications, and Services(MobiSys)
-
-
Grace, M.1
Zhou, Y.2
Zhang, Q.3
|