Estimating the Assessment Difficulty of CVSS Environmental Metrics: An Experiment
暂无分享,去创建一个
Fabio Massacci | Bruno Crispo | Katsiaryna Labunets | Luca Allodi | Silvio Biagioni | Wagner Santos | B. Crispo | F. Massacci | Luca Allodi | Katsiaryna Labunets | Silvio Biagioni | Wagner Santos
[1] Yuqing Zhang,et al. Improving VRSS-based vulnerability prioritization using analytic hierarchy process , 2012, J. Syst. Softw..
[2] Ying Dong,et al. A Novel Automatic Severity Vulnerability Assessment Framework , 2015, J. Commun..
[3] Tony Bradley,et al. PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance , 2007 .
[4] Hannes Holm,et al. An expert-based investigation of the Common Vulnerability Scoring System , 2015, Comput. Secur..
[5] Karen A. Scarfone,et al. SP 800-117. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 , 2010 .
[6] Anton A. Chuvakin,et al. PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance , 2012 .
[7] Fabio Massacci,et al. Security triage: A report of a lean security requirements methodology for cost-effective security analysis , 2014, 2014 IEEE 4th International Workshop on Empirical Requirements Engineering (EmpiRE).
[8] Karen A. Scarfone,et al. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 , 2010 .
[9] Sushil Jajodia,et al. Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks , 2014, ESORICS.
[10] Siv Hilde Houmb,et al. Quantifying security risk level from CVSS estimates of frequency and impact , 2010, J. Syst. Softw..
[11] Bernhard Plattner,et al. Large-scale vulnerability analysis , 2006, LSAD '06.
[12] Karl Aberer,et al. A Non-Intrusive and Context-Based Vulnerability Scoring Framework for Cloud Services , 2016, ArXiv.
[13] Per Runeson,et al. Using Students as Experiment Subjects – An Analysis on Graduate and Freshmen Student Data , 2003 .
[14] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using , 2014 .
[15] Laurent Gallon,et al. Using CVSS in Attack Graphs , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[16] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2013, TSEC.
[17] Yashwant K. Malaiya,et al. Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System , 2015, 2015 IEEE International Conference on Software Quality, Reliability and Security.
[18] Sushil Jajodia,et al. Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks , 2016, IEEE Transactions on Information Forensics and Security.
[19] Robin R. Pennington,et al. The Effects of Information Overload on Software Project Risk Assessment , 2007, Decis. Sci..
[20] Claes Wohlin,et al. Using Students as Subjects—A Comparative Study of Students and Professionals in Lead-Time Impact Assessment , 2000, Empirical Software Engineering.
[21] Ling Gao,et al. An Improved CVSS-based Vulnerability Scoring Mechanism , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[22] Aine MacDermott,et al. A Methodology to Develop Dynamic Cost-Centric Risk Impact Metrics , 2015, 2015 International Conference on Developments of E-Systems Engineering (DeSE).
[23] Mathias Ekstedt,et al. Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[24] Umesh Kumar Singh,et al. Quantitative Security Risk Evaluation using CVSS Metrics by Estimation of Frequency and Maturity of Exploit , 2016 .