Cybersecurity Snapshot: Google, Twitter, and Other Online Databases
暂无分享,去创建一个
[1] Inderpal S. Bhandari,et al. Orthogonal Defect Classification - A Concept for In-Process Measurements , 1992, IEEE Trans. Software Eng..
[2] Anne E. James,et al. Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks , 2015, Comput. Electr. Eng..
[3] Jim Gray,et al. Why Do Computers Stop and What Can Be Done About It? , 1986, Symposium on Reliability in Distributed Software and Database Systems.
[4] David Cooper,et al. President's information technology advisory committee (PITAC): subcommittee on transforming the government , 2000, DG.O.
[5] John Viega,et al. 19 Deadly Sins of Software Security , 2005 .
[6] David Clark,et al. Computers at risk: safe computing in the information age , 1991 .
[7] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[8] Sanjay Silakari,et al. A Survey of Cyber Attack Detection Systems , 2009 .
[9] Stefan Wagner,et al. Defect classification and defect types revisited , 2008, DEFECTS '08.
[10] Pascal Meunier,et al. Classes of Vulnerabilities and Attacks , 2008 .
[11] Kishor S. Trivedi,et al. A Classification of Software Faults , 2011 .
[12] John G. Voeller. Wiley handbook of science and technology for homeland security , 2008 .
[13] Jeffrey L. Hieb,et al. Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.
[14] Alexander L. Wijesinha,et al. Splitting HTTP requests on two servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[15] Kishor S. Trivedi,et al. Software Faults, Software Aging and Software Rejuvenation( New Development of Software Reliability Engineering) , 2005 .
[16] Bharat S. Rawal,et al. Nth Order Binary Encoding with Split-Protocol , 2018, Int. J. Rough Sets Data Anal..
[17] Kishor S. Trivedi,et al. An empirical investigation of fault types in space mission system software , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[18] Alpana Dubey. Towards adopting ODC in automation application development projects , 2012, ISEC.
[19] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[20] Guofei Gu,et al. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.
[21] Levente Buttyán,et al. Embedded systems security: Threats, vulnerabilities, and attack taxonomy , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[22] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[23] Mark Butcher,et al. Improving software testing via ODC: Three case studies , 2002, IBM Syst. J..
[24] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[25] Amit M. Paradkar,et al. A software flaw taxonomy: aiming tools at security , 2005, SOEN.
[26] Data processing-open systems interconnection - basic reference model , 1981, CCRV.
[27] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[28] Wenliang Du,et al. Categorization of Software Errors that led to Security Breaches , 1998 .
[29] Omar H. Alhazmi,et al. Quantitative vulnerability assessment of systems software , 2005, Annual Reliability and Maintainability Symposium, 2005. Proceedings..
[30] Naima Kaabouch,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[31] Alae Loukili,et al. Anticipatory Cyber Security Research: An Ultimate Technique for the First-Move Advantage , 2016 .
[32] Andy Ozment,et al. Improving vulnerability discovery models , 2007, QoP '07.
[33] John Liederbach,et al. Digital Crime and Digital Terrorism , 2005 .
[34] Kishor S. Trivedi,et al. Fighting bugs: remove, retry, replicate, and rejuvenate , 2007, Computer.
[35] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[36] Ram Chillarege,et al. Test and development process retrospective - a case study using ODC triggers , 2002, Proceedings International Conference on Dependable Systems and Networks.
[37] Michael Grüninger,et al. Introduction , 2002, CACM.