Author:
Manadhata Pratyusa K.,Wing Jeannette M.
Reference30 articles.
1. J. Alves-Foss and S. Barbosa. Assessing computer security vulnerability. ACM SIGOPS Operating Systems Review, 29(3), 1995.
2. E. Asbeck and Y. Y. Haimes. The partitioned multiobjective risk method. Large Scale Systems, 6(1):13–38, 1984.
3. M. Dacier and Y. Deswarte. Privilege graph: An extension to the typed access matrix model. In Proc. of European Symposium on Research in Computer Security, 1994.
4. N. E. Fenton and M. Neil. A critique of software defect prediction models. IEEE Transactions on Software Engineering, 25(5), 1999.
5. Norman E. Fenton and Shari Lawrence Pfleeger. Software Metrics: A Rigorous and Practical Approach. PWS Publishing Co., Boston, MA, USA, 1998.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention;2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD);2024-05-08
2. Edge Computing Security: Overview and Challenges;Studies in Systems, Decision and Control;2024
3. Enhancing Network Security Through Moving Target Defense Technology: An Analysis of the Impact on Attack Level;2023 7th International Conference on Internet of Things and Applications (IoT);2023-10-25
4. Cyberattack Graph Modeling for Visual Analytics;IEEE Access;2023
5. Cyber Security;Introduction to Satellite Ground Segment Systems Engineering;2022-08-24