Underground Economics for Vulnerability Risk
暂无分享,去创建一个
[1] Fabio Massacci,et al. The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures , 2017 .
[2] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.
[3] Cormac Herley,et al. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy , 2009, WEIS.
[4] Luca Allodi,et al. The Heavy Tails of Vulnerability Exploitation , 2015, ESSoS.
[5] John A. Sokolowski,et al. Probabilistic Risk Analysis and Terrorism Risk , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[6] Tudor Dumitras,et al. Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild , 2014, RAID.
[7] Stefan Savage,et al. Manufacturing compromise: the emergence of exploit-as-a-service , 2012, CCS.
[8] Fabio Massacci,et al. Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned , 2016, IEEE Transactions on Emerging Topics in Computing.
[9] Luca Allodi,et al. Economic Factors of Vulnerability Trade and Exploitation , 2017, CCS.
[10] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using , 2014 .