Author:
Bashar M.A.,Krishnan G.,Kuhn M.G.,Spafford E.H.,Wagstaff S.S., Jr.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards data-driven vulnerability prediction for requirements;Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2018-10-26
2. Ghost Patches: Fake Patches for Fake Vulnerabilities;ICT Systems Security and Privacy Protection;2017
3. Defensive Camouflage;Introduction to Cyberdeception;2016
4. Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities;2008 IEEE International Conference on Networking, Sensing and Control;2008-04
5. Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms;Fuzzy Systems and Knowledge Discovery;2006