Predicting Cyber Risks through National Vulnerability Database
暂无分享,去创建一个
[1] Anoop Singhal,et al. An Empirical Study of a Vulnerability Metric Aggregation Method , 2011 .
[2] Richard Lippmann,et al. Modeling Modern Network Attacks and Countermeasures Using Attack Graphs , 2009, 2009 Annual Computer Security Applications Conference.
[3] Xinwen Zhang,et al. After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud , 2014, AsiaCCS.
[4] Y.K. Malaiya,et al. Prediction capabilities of vulnerability discovery models , 2006, RAMS '06. Annual Reliability and Maintainability Symposium, 2006..
[5] Miles McQueen,et al. Empirical Estimates and Observations of 0Day Vulnerabilities , 2009 .
[6] Jan Vitek,et al. Vulnerability likelihood: a probabilistic approach to software assurance , 2005 .
[7] Su Zhang. Deep-diving into an Easily-overlooked Threat : Inter-VM Attacks , 2012 .
[8] Fabio Massacci,et al. Which is the right source for vulnerability studies?: an empirical analysis on Mozilla Firefox , 2010, MetriSec '10.
[9] Viet Hung Nguyen,et al. Predicting vulnerable software components with dependency graphs , 2010, MetriSec '10.
[10] Atul Prakash,et al. Distilling critical attack graph surface iteratively through minimum-cost SAT solving , 2011, ACSAC '11.
[11] Xinming Ou,et al. Effective Network Vulnerability Assessment through Model Abstraction , 2011, DIMVA.
[12] Scott A. DeLoach,et al. Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense | NIST , 2012 .
[13] Scott A. DeLoach,et al. Model-driven, Moving-Target Defense for Enterprise Network Security , 2011, Models@run.time@Dagstuhl.
[14] James Andrew Ozment,et al. Vulnerability discovery & software security , 2007 .
[15] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[16] Thomas Steinke,et al. ZIB Structure Prediction Pipeline: Composing a Complex Biological Workflow Through Web Services , 2006, Euro-Par.
[17] Xinwen Zhang,et al. Assessing Attack Surface with Component-Based Package Dependency , 2015, NSS.
[18] David A. Schmidt,et al. Aggregating vulnerability metrics in enterprise networks using attack graphs , 2013, J. Comput. Secur..
[19] May R. Chaffin,et al. Empirical Estimates and Observations of 0Day Vulnerabilities , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[20] Scott A. DeLoach,et al. Investigating the application of moving target defenses to network security , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[21] Doina Caragea,et al. An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities , 2011, DEXA.
[22] M S Waterman,et al. Identification of common molecular subsequences. , 1981, Journal of molecular biology.
[23] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .