Author:
Baiardi Fabrizio,Sgandurra Daniele
Publisher
Springer Science and Business Media LLC
Subject
General Environmental Science
Reference75 articles.
1. Alberts C, Allen J, Stoddard R (2012) Risk-based measurement and analysis: application to software security. Tech. rep., Software Engineering Inst., CMU
2. Ammann P, Wijesekera D, Kaushik S (2002) Scalable, graph-based network vulnerability analysis. In: proceedings of the 9th ACM conference on computer and communications security, CCS ’02. ACM, pp 217–224
3. Arora A, Hall D, Piato C, Ramsey D, Telang R (2004) Measuring the risk-based value of it security solutions. IT Prof 6(6):35–42
4. Baiardi F,F, T, F., C., L, G.: Gvscan: Scanning networks for global vulnerabilities. In: first international workshop on emerging cyberthreats and countermeasures (2013)
5. Barnum S (2008) Common attack pattern enumeration and classification (capec) schema description. Cigital Inc. http://capec.mitre.org/documents/documentation/CAPEC_Schema_Description_v13
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献