Author:
Jia Qian,Qu Xinxue,Jiang Zhengrui,Wang Chengjun
Reference35 articles.
1. Timing the application of security patches for optimal uptime;S Beattie;LISA,2002
2. Beyond heuristics: Learning to classify vulnerabilities and predict exploits;M Bozorgi;Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining,2010
3. Security patch management: Share the burden or share the damage?;H Cavusoglu;Management Science,2008