Author:
Russo Ernesto Rosario,Di Sorbo Andrea,Visaggio Corrado A.,Canfora Gerardo
Subject
Hardware and Architecture,Information Systems,Software
Reference67 articles.
1. Comparing vulnerability severity and exploits using case-control studies;Allodi;ACM Trans. Inf. Syst. Secur.,2014
2. Improving traceability link recovery methods through software artifact summarization;Aponte,2011
3. Windows of vulnerability: a case study analysis;Arbaugh;Computer,2000
4. Understanding cybercrime from its stakeholders’ perspectives: part 1–attackers;Arief;IEEE Secur. Priv.,2015
5. Modern Information Retrieval;Baeza-Yates,1999
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献