Subject
Computer Science Applications,Information Systems,Software
Reference70 articles.
1. An NSA-derived ransomware worm is shutting down computers worldwide;Dan Goodin,2017
2. F. Yamaguchi, M. Lottmann, K. Rieck, Generalized vulnerability extrapolation using abstract syntax trees, in: Proceedings of the 28th Annual Computer Security Applications Conference, 2012, pp. 359–368.
3. Z. Durumeric, F. Li, J. Kasten, J. Amann, J. Beekman, M. Payer, N. Weaver, D. Adrian, V. Paxson, M. Bailey, et al. The matter of heartbleed, in: Proceedings of the 2014 conference on internet measurement conference, 2014, pp. 475–488.
4. Umlsec: Extending UML for secure systems development;Jürjens,2002
5. Ontology-driven evolution of software security;Peldszus;Data Knowl. Eng.,2021
Cited by
57 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献