Author:
Ruohonen Jukka,Hyrynsalmi Sami,Leppänen Ville
Publisher
Springer International Publishing
Reference29 articles.
1. Allodi, L., Massacci, F.: Comparing vulnerability severity and exploits using case-control studies. ACM Trans. Inf. Syst. Secur. 17(1), 1:1–1:20 (2014)
2. Arbaugh, W.A., Fithen, W.L., McHugh, J.: Window of vulnerability: a case study analysis. Computer 32(12), 52–59 (2000)
3. Arora, A., Forman, C., Nandkumar, A., Telang, R.: Competition and patching of security vulnerabilities: an empirical analysis. Inf. Econ. Policy 22(2), 164–177 (2010)
4. Canonical Ltd.: Releases (2015). https://wiki.ubuntu.com/Releases. July 2015
5. Canonical Ltd.: Ubuntu Security Notices (2015). http://www.ubuntu.com/usn/. March 2015
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献