A study on Web security incidents in China by analyzing vulnerability disclosure platforms
暂无分享,去创建一个
[1] Yashwant K. Malaiya,et al. Software Vulnerability Markets: Discoverers and Buyers , 2014 .
[2] Pavol Zavarsky,et al. Trend Analysis of the CVE for Software Vulnerability Management , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[3] Jan Tudor,et al. Web Application Vulnerability Statistics 2013 , 2013 .
[4] Lionel C. Briand,et al. Black-box SQL Injection Testing , 2014 .
[5] Miguel Correia,et al. Automatic detection and correction of web application vulnerabilities using data mining to predict false positives , 2014, WWW.
[6] Ping Chen,et al. Security Analysis of the Chinese Web: How well is it protected? , 2014, SafeConfig '14.
[7] A. Tripathi,et al. Taxonomic analysis of classification schemes in vulnerability databases , 2012, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT).
[8] Lwin Khin Shar,et al. Predicting common web application vulnerabilities from input validation and sanitization code patterns , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.
[9] Patrick Cousot,et al. Andromeda: Accurate and Scalable Security Analysis of Web Applications , 2013, FASE.
[10] Cheng Yang,et al. An analysis view on password patterns of Chinese internet users , 2013 .
[11] Thomas Zimmermann,et al. Security Trend Analysis with CVE Topic Models , 2010, 2010 IEEE 21st International Symposium on Software Reliability Engineering.
[12] Dongho Won,et al. Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing , 2012, NPC.
[13] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[14] Qi Xiong,et al. Similar vulnerability query based on text mining , 2011, 2011 11th International Symposium on Communications & Information Technologies (ISCIT).
[15] Ryan K. L. Ko,et al. Escrow: A Large-Scale Web Vulnerability Assessment Tool , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[16] K. Raghuveer,et al. An Effective Technique for Intrusion Detection Using Neuro-Fuzzy and Radial SVM Classifier , 2013 .
[17] Wouter Joosen,et al. Large-Scale Security Analysis of the Web: Challenges and Findings , 2014, TRUST.
[18] Christopher Ke,et al. Analysis of the Australian web threat landscape , 2013 .
[19] Wenyuan Xu,et al. A Large-Scale Empirical Analysis of Chinese Web Passwords , 2014, USENIX Security Symposium.