Risk-Driven Vulnerability Testing: Results from eHealth Experiments Using Patterns and Model-Based Approach
暂无分享,去创建一个
[1] Guilherme Horta Travassos,et al. A Picture from the Model-Based Testing Area: Concepts, Techniques, and Challenges , 2010, Adv. Comput..
[2] Christopher Krügel,et al. Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner , 2012, USENIX Security Symposium.
[3] Jason Hong,et al. Protecting against data breaches; living with mistakes , 2012, CACM.
[4] Ketil Stølen,et al. Model-Driven Risk Analysis - The CORAS Approach , 2010 .
[5] Michael Stonebraker,et al. Researchers' big data crisis; understanding design and functionality , 2012, Commun. ACM.
[6] Lawrence Chung,et al. Managing security and privacy in ubiquitous eHealth information interchange , 2011, ICUIMC '11.
[7] Marco Eichelberg,et al. A survey and analysis of Electronic Healthcare Record standards , 2005, CSUR.
[8] Petros Belsis,et al. Towards effective organization of medical data , 2013, PCI '13.
[9] Giovanni Vigna,et al. Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners , 2010, DIMVA.
[10] James Bach. Risk and Requirements-Based Testing , 1999, Computer.
[11] Fabrice Bouquet,et al. A test generation solution to automate software testing , 2008, AST '08.
[12] Julien Botella,et al. Risk-Based Vulnerability Testing Using Security Test Patterns , 2014, ISoLA.
[13] Franck Lebeau,et al. Efficient Detection of Multi-step Cross-Site Scripting Vulnerabilities , 2014, ICISS.