Vulnerability Selection for Remediation: An Empirical Analysis:
暂无分享,去创建一个
[1] Chris Hankin,et al. Decision support approaches for cyber security investment , 2015, Decis. Support Syst..
[2] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .
[3] Theodore T. Allen,et al. Control charting methods for autocorrelated cyber vulnerability data , 2016 .
[4] Stefan Rass,et al. Risk Assessment Uncertainties in Cybersecurity Investments , 2018, Games.
[5] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2014, TSEC.
[6] Marco Angelini,et al. Vulnus: Visual Vulnerability Analysis for Network Security , 2019, IEEE Transactions on Visualization and Computer Graphics.
[7] Mathias Ekstedt,et al. Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[8] Theodore T. Allen,et al. Data-Driven Cyber-Vulnerability Maintenance Policies , 2014 .
[9] Jun Zhang,et al. Security Patch Management: Share the Burden or Share the Damage? , 2008, Manag. Sci..
[10] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2013, TSEC.