Author:
Kumar Vivek,Anjum Misbah,Agarwal Vernika,Kapur P. K.
Publisher
Springer International Publishing
Reference26 articles.
1. Bozorgi M, Saul LK, Savage S, Voelker GM (2010) Beyond heuristics: learning to classify vulnerabilities and predict exploits. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 105–114
2. Vallentin M (2008) Software vulnerabilities lecture notes
3. Kapur PK, Pham H, Gupta A, Jha PC (2011) Software reliability assessment with OR applications. Springer, London, p 364
4. Wang JA, Wang H, Guo M, Xia M (2009) Security metrics for software systems. In: Proceedings of the 47th annual southeast regional conference, pp 1–6
5. Cashell B, Jackson WD, Jickling M, Webel B (2004) The economic impact of cyber-attacks. Congressional research service documents, vol 2, CRS RL32331, Washington DC
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献