Publisher
Springer International Publishing
Reference24 articles.
1. ISO/IEC JTC 1/SC 27: International standard ISO/IEC 27001: 2013. Information technology – Security techniques – Information security management systems – Requirements. Information security, cybersecurity and privacy protection (2013)
2. Stuckman, J., Walden, J., Scandariato, R.: The Effect of dimensionality reduction on software vulnerability prediction models. IEEE Trans. Reliab. 66(1), 17–37 (2017). https://doi.org/10.1109/tr.2016.2630503
3. Scandariato, R., Walden, J., Hovsepyan, A., et al.: Predicting vulnerable software components via text mining. IEEE Trans. Software Eng. 40(10), 993–1006 (2014). https://doi.org/10.1109/tse.2014.2340398
4. Yasasin, E., Prester, J., Wagner, G., et al.: Forecasting IT security vulnerabilities – an empirical analysis. Comput. Secur. 88 (2020). https://doi.org/10.1016/j.cose.2019.101610
5. Deb, A., Lerman, K., Ferrara, E.: Predicting cyber-events by Leveraging hacker sentiment. Information 9(11), 18 (2018). https://doi.org/10.3390/info9110280