-
2
-
-
84864270546
-
A large scale exploratory analysis of software vulnerability life cycles
-
M. Shahzad, M. Z. Shafiq and A. X. Liu, "A large scale exploratory analysis of software vulnerability life cycles," in Proceedings of the 34th International Conference on Software Engineering, Zurich, Switzerland, 2012, pp. 771-781.
-
(2012)
Proceedings of the 34th International Conference on Software Engineering, Zurich, Switzerland
, pp. 771-781
-
-
Shahzad, M.1
Shafiq, M.Z.2
Liu, A.X.3
-
3
-
-
84884138082
-
Are markets for vulnerabilities effective"
-
S. Ransbotham, S. Mitra and J. Ramsey, "Are markets for vulnerabilities effective" MIS Quarterly, vol. 36, pp. 43-64, 2012.
-
(2012)
MIS Quarterly
, vol.36
, pp. 43-64
-
-
Ransbotham, S.1
Mitra, S.2
Ramsey, J.3
-
4
-
-
84937682897
-
Software vulnerability markets: Discoverers and buyers
-
A. Algarni and Y. Malaiya, "Software vulnerability markets: Discoverers and buyers," International Journal of Computer, Information Science and Engineering, vol. 8, pp. 71-81, 2014.
-
(2014)
International Journal of Computer, Information Science and Engineering
, vol.8
, pp. 71-81
-
-
Algarni, A.1
Malaiya, Y.2
-
5
-
-
33750440197
-
The economics of information security
-
R. Anderson and T. Moore, "The economics of information security," Science, vol. 314, pp. 610-613, 2006.
-
(2006)
Science
, vol.314
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
6
-
-
77954250852
-
An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure
-
A. Arora, R. Krishnan, R. Telang, and Y. Yang, "An empirical analysis of software vendors' patch release behavior: impact of vulnerability disclosure," Information Systems Research, vol. 21, pp. 115-132, 2010.
-
(2010)
Information Systems Research
, vol.21
, pp. 115-132
-
-
Arora, A.1
Krishnan, R.2
Telang, R.3
Yang, Y.4
-
8
-
-
84890909615
-
The influence of software process maturity and customer error reporting on software release and pricing
-
T. August and M. F. Niculescu, "The Influence of Software Process Maturity and Customer Error Reporting on Software Release and Pricing," Management Science, vol. 59, pp. 2702-2726, 2013.
-
(2013)
Management Science
, vol.59
, pp. 2702-2726
-
-
August, T.1
Niculescu, M.F.2
-
9
-
-
84883376261
-
Analyzing security threats as reported by the United States Computer Emergency Readiness Team (US-CERT)
-
Y.S. Baker, R. Agrawal and S. Bhattacharya, "Analyzing security threats as reported by the United States Computer Emergency Readiness Team (US-CERT)," in Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on, Seattle, WA, 2013, pp. 10-12.
-
(2013)
Intelligence and Security Informatics (ISI) 2013 IEEE International Conference On, Seattle, WA
, pp. 10-12
-
-
Baker, Y.S.1
Agrawal, R.2
Bhattacharya, S.3
-
10
-
-
79959888787
-
Empirical results on the study of software vulnerabilities (NIER track)
-
Y. Wu, H. Siy and R. Gandhi, "Empirical results on the study of software vulnerabilities (NIER track)," in Proceedings of the 33rd International Conference on Software Engineering, Waikiki, Honolulu, HI, USA, 2011, pp. 964-967.
-
(2011)
Proceedings of the 33rd International Conference on Software Engineering, Waikiki, Honolulu, HI, USA
, pp. 964-967
-
-
Wu, Y.1
Siy, H.2
Gandhi, R.3
-
11
-
-
84970914453
-
A comprehensive analysis of android security and proposed solutions
-
A. S. Yuksel, A. H. Zaim and M. A. Aydin, "A Comprehensive Analysis of Android Security and Proposed Solutions," International Journal of Computer Network and Information Security, vol. 6, pp. 9-20, 2014.
-
(2014)
International Journal of Computer Network and Information Security
, vol.6
, pp. 9-20
-
-
Yuksel, A.S.1
Zaim, A.H.2
Aydin, M.A.3
-
12
-
-
79551587720
-
Cytoscape 2.8: New features for data integration and network visualization
-
2011-02-01
-
M. E. Smoot, K. Ono, J. Ruscheinski, P. L. Wang, and T. Ideker, "Cytoscape 2.8: new features for data integration and network visualization," Bioinformatics, vol. 27, pp. 431-2, 2011-02-01 2011.
-
(2011)
Bioinformatics
, vol.27
, pp. 431-432
-
-
Smoot, M.E.1
Ono, K.2
Ruscheinski, J.3
Wang, P.L.4
Ideker, T.5
-
13
-
-
84970885415
-
System thinking of the Software Vulnerability Market via Complex Network Theory
-
K. Huang, Z. Feng, J. Li, and X. Li, "System thinking of the Software Vulnerability Market via Complex Network Theory," in 36th IEEE Symposium on Security and Privacy FAIRMONT, SAN JOSE, CA, 2015.
-
(2015)
36th IEEE Symposium on Security and Privacy FAIRMONT, SAN JOSE, CA
-
-
Huang, K.1
Feng, Z.2
Li, J.3
Li, X.4
-
14
-
-
84897046373
-
A large-scale empirical study on software reuse in mobile apps
-
I. J. Mojica, B. Adams, M. Nagappan, S. Dienst, T. Berger, and A. E. Hassan, "A large-scale empirical study on software reuse in mobile apps," Software, IEEE, vol. 31, pp. 78-86, 2014.
-
(2014)
Software IEEE
, vol.31
, pp. 78-86
-
-
Mojica, I.J.1
Adams, B.2
Nagappan, M.3
Dienst, S.4
Berger, T.5
Hassan, A.E.6
-
15
-
-
77956214438
-
Beyond heuristics: Learning to classify vulnerabilities and predict exploits
-
Washington, DC, USA
-
M. Bozorgi, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond heuristics: learning to classify vulnerabilities and predict exploits," in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, Washington, DC, USA, 2010, pp. 105-114.
-
(2010)
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 105-114
-
-
Bozorgi, M.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
16
-
-
34248370608
-
Large-scale vulnerability analysis
-
S. Frei, M. May, U. Fiedler, and B. Plattner, "Large-scale vulnerability analysis," in Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, Pisa, Italy, 2006, pp. 131-138.
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Large-scale Attack Defense, Pisa, Italy
, pp. 131-138
-
-
Frei, S.1
May, M.2
Fiedler, U.3
Plattner, B.4
-
17
-
-
34547100991
-
An empirical analysis of the impact of software vulnerability announcements on firm stock price
-
R. Telang and S. Wattal, "An empirical analysis of the impact of software vulnerability announcements on firm stock price," Software Engineering, IEEE Transactions on, vol. 33, pp. 544-557, 2007.
-
(2007)
Software Engineering IEEE Transactions on
, vol.33
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
|