A Structured Approach to Classifying Security Vulnerabilities
暂无分享,去创建一个
[1] William L. Fithen,et al. Formal modeling of vulnerability , 2004, Bell Labs Technical Journal.
[2] R. P. Abbott,et al. Security Analysis and Enhancements of Computer Operating Systems , 1976 .
[3] Grace A. Lewis,et al. Building systems from commercial components , 2002, ICSE '02.
[4] Deborah L. McGuinness,et al. OWL Web ontology language overview , 2004 .
[5] Matt Bishop,et al. A Taxonomy of UNIX System and Network Vulnerabilities , 1997 .
[6] Matt Bishop,et al. A Critical Analysis of Vulnerability Taxonomies , 1996 .
[7] Mary Shaw,et al. Truth vs. knowledge: the difference between what a component does and what we know it does , 1996, Proceedings of the 8th International Workshop on Software Specification and Design.
[8] Carl E. Landwehr,et al. A taxonomy of computer program security flaws , 1993, CSUR.
[9] Jeremy J. Carroll,et al. Resource description framework (rdf) concepts and abstract syntax , 2003 .