Integrated quantitative assessment of mainstream operating systems' security vulnerabilities

被引:0
|
作者
Research Center of Information Intelligent and Information Security, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China [1 ]
不详 [2 ]
机构
来源
Gaojishu Tongxin | 2007年 / 4卷 / 331-336期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Security vulnerabilities in software systems: A quantitative perspective
    Alhazmi, O
    Malaiya, Y
    Ray, I
    DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 281 - 294
  • [2] Availability Assessment of Embedded Systems with Security Vulnerabilities
    Kornecki, Andrew J.
    Zalewski, Janusz
    Stevenson, Wendy F.
    2011 34TH IEEE SOFTWARE ENGINEERING WORKSHOP (SEW 2011), 2011, : 42 - 47
  • [3] AN APPROACH FOR DETECTING SECURITY VULNERABILITIES IN WEB BROWSERS FOR MOBILE OPERATING SYSTEMS
    Mechev, Stoyan
    MATHEMATICS AND INFORMATICS, 2024, 67 (05): : 475 - 488
  • [4] Enforcement of integrated security policy in Trusted Operating Systems
    Kim, Hyung Chan
    Ramakrishna, R. S.
    Shin, Wook
    Sakurai, Kouichi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 214 - +
  • [5] Unveiling the Security Vulnerabilities in Android Operating System
    Renjith, G.
    Aji, S.
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON SUSTAINABLE EXPERT SYSTEMS (ICSES 2021), 2022, 351 : 89 - 100
  • [6] Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics
    Ghani, Hamza
    Luna, Jesus
    Suri, Neeraj
    2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 2013,
  • [7] Towards Integrated Quantitative Security and Safety Risk Assessment
    Dobaj, Juergen
    Schmittner, Christoph
    Krisper, Michael
    Macher, Georg
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11699 : 102 - 116
  • [8] Introduction to Quantum Systems and Security Vulnerabilities
    Astaburuaga, Ignacio
    Sengupta, Shamik
    2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024, : 345 - 351
  • [9] Understanding Security Vulnerabilities in File Systems
    Cai, Miao
    Huang, Hao
    Huang, Jian
    APSYS'19: PROCEEDINGS OF THE 10TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, 2019, : 8 - 15
  • [10] Quantitative risk assessment for dependent vulnerabilities
    Sahinoglu, Mehmet
    2006 Proceedings - Annual Reliability and Maintainability Symposium, Vols 1 and 2, 2006, : 82 - 85