Author:
Alhazmi O.H.,Malaiya Y.K.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation;2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C);2022-12
2. A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda;International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020);2021
3. Predicting Vulnerable Software Components via Bellwethers;Communications in Computer and Information Science;2019
4. Predicting Cyber Risks through National Vulnerability Database;Information Security Journal: A Global Perspective;2015-11-30
5. Game of detections: how are security vulnerabilities discovered in the wild?;Empirical Software Engineering;2015-09-15