Estimates on the effectiveness of web application firewalls against targeted attacks
暂无分享,去创建一个
[1] A. O'Hagan,et al. Statistical Methods for Eliciting Probability Distributions , 2005 .
[2] R. Cooke. Experts in Uncertainty: Opinion and Subjective Probability in Science , 1991 .
[3] Roger M. Cooke,et al. TU Delft expert judgment data base , 2008, Reliab. Eng. Syst. Saf..
[4] L. Cronbach. Coefficient alpha and the internal structure of tests , 1951 .
[5] Andy Ozment,et al. Improving vulnerability discovery models , 2007, QoP '07.
[6] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[7] Robert L. Winkler,et al. Combining Probability Distributions From Experts in Risk Analysis , 1999 .
[8] Wouter Joosen,et al. On the secure software development process: CLASP, SDL and Touchpoints compared , 2009, Inf. Softw. Technol..
[9] William K. Robertson,et al. An empirical analysis of input validation mechanisms in web applications and languages , 2012, SAC '12.
[10] Mathias Ekstedt,et al. Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations , 2012, J. Univers. Comput. Sci..
[11] Marco Vieira,et al. Comparing SQL Injection Detection Tools Using Attack Injection: An Experimental Study , 2010, 2010 IEEE 21st International Symposium on Software Reliability Engineering.
[12] Mathias Ekstedt,et al. Effort Estimates for Vulnerability Discovery Projects , 2012, 2012 45th Hawaii International Conference on System Sciences.
[13] S. Tamer Cavusgil,et al. Mail survey response behavior: A conceptualization of motivating factors and an empirical study , 1998 .
[14] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[15] Mathias Ekstedt,et al. Effort Estimates on Web Application Vulnerability Discovery , 2013, 2013 46th Hawaii International Conference on System Sciences.
[16] Abhinav Rastogi,et al. Secure Coding: Building Security into the Software Development Life Cycle , 2004, Inf. Secur. J. A Glob. Perspect..
[17] David J. Weiss,et al. Empirical Assessment of Expertise , 2003, Hum. Factors.
[18] Mathias Ekstedt,et al. A Metamodel for Web Application Injection Attacks and Countermeasures , 2012, TEAR/PRET.