메뉴 건너뛰기




Volumn , Issue , 2019, Pages 383-396

The beauty and the beast: Vulnerabilities in red hat's packages

Author keywords

[No Author keywords available]

Indexed keywords

RISK ASSESSMENT; SUPPORT VECTOR MACHINES; TESTING;

EID: 85077041914     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (32)

References (38)
  • 2
    • 26444516466 scopus 로고    scopus 로고
    • Security vulnerabilities in software systems: A quantitative perspective
    • Springer Verlag, Berlin, Heidelberg, August
    • Omar Alhazmi, Yashwant Malaiya, and Indrajit Ray. Security Vulnerabilities in Software Systems: A Quantitative Perspective, volume 3645/2005 of Lecture Notes in Computer Science, pages 281-294. Springer Verlag, Berlin, Heidelberg, August 2005.
    • (2005) 3645/2005 of Lecture Notes in Computer Science , pp. 281-294
    • Alhazmi, O.1    Malaiya, Y.2    Ray, I.3
  • 4
    • 0033163749 scopus 로고    scopus 로고
    • Building knowledge through families of experiments
    • Victor R. Basili, Forrest Shull, and Filippo Lanubile. Building knowledge through families of experiments. IEEE Trans. Software Eng., 25(4):456-473, 1999.
    • (1999) IEEE Trans. Software Eng. , vol.25 , Issue.4 , pp. 456-473
    • Basili, V.R.1    Shull, F.2    Lanubile, F.3
  • 5
    • 85077039077 scopus 로고    scopus 로고
    • Last accessed: Aug. 2008
    • Ladislav Bodnar. Is RPM doomed? http://distrowatch.com/dwres.php?resource=article-rpm, 2002. Last accessed: Aug. 2008.
    • (2002) Is RPM Doomed?
    • Bodnar, L.1
  • 9
    • 85077046790 scopus 로고    scopus 로고
    • August
    • Free Software Foundation. DDD data display debugger. http://www.gnu.org/software/ddd/, August 2008.
    • (2008) DDD Data Display Debugger
  • 13
    • 34548799736 scopus 로고    scopus 로고
    • Using software distributions to understand the relationship among free and open source software projects
    • Daniel M. Germán. Using software distributions to understand the relationship among free and open source software projects. In Proc. Int'l. Workshop on Mining Software Repositories (MSR), page 24, 2007.
    • (2007) Proc. Int'L. Workshop on Mining Software Repositories (MSR) , pp. 24
    • Germán, D.M.1
  • 16
    • 84864581418 scopus 로고    scopus 로고
    • Electrotechnical Commission. ISO/IEC 9899:TC3 committee draft. Technical report, Int'l. Organization for Standardization, September
    • Int'l. Organization for Standardization and Int'l. Electrotechnical Commission. ISO/IEC 9899:TC3 committee draft. Technical report, Int'l. Organization for Standardization, September 2007.
    • (2007) Int'L. Organization for Standardization and Int'L
  • 23
    • 85077047474 scopus 로고    scopus 로고
    • September
    • National Institute of Standards. CVE 2007-5135. http://nvd.nist.gov/nvd.cfm?cvename= CVE-2007-5135, September 2007.
    • (2007) CVE 2007-5135
  • 28
    • 84863304598 scopus 로고    scopus 로고
    • R Foundation for Statistical Computing, Vienna, Austria, ISBN
    • R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2008. ISBN 3-900051-07-0.
    • (2008) R: A Language and Environment for Statistical Computing
  • 29
    • 85077034311 scopus 로고    scopus 로고
    • August
    • RedHat Network. Errata. https://rhn.redhat.com/errata/, August 2008.
    • (2008) Errata
  • 38
    • 77952369900 scopus 로고    scopus 로고
    • On estimating the security risks of composite software services
    • June
    • Jian Yin, Chunqiang Tang, Xiaolan Zhang, and Michael McIntosh. On estimating the security risks of composite software services. In Proc. PASSWORD Workshop, June 2006.
    • (2006) Proc. PASSWORD Workshop
    • Yin, J.1    Tang, C.2    Zhang, X.3    McIntosh, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.