共 50 条
- [32] Security Characterization for Evaluation of Software Architectures using ATAM 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2009, : 196 - 201
- [33] Modeling of a Software Vulnerability Identification Method INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (09): : 354 - 357
- [34] Detecting and eliminating the cascade vulnerability problem from multilevel security networks using soft constraints PROCEEDING OF THE NINETEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE SIXTEENTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2004, : 808 - 813
- [35] A Scalable Approach for Vulnerability Discovery Based on Security Patches APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 109 - 122
- [36] Change Point Problem in Security Vulnerability Discovery Model 2019 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2019), 2019, : 21 - 26
- [38] Software vulnerability prioritization using vulnerability description International Journal of System Assurance Engineering and Management, 2021, 12 : 58 - 64
- [39] Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions WEB INFORMATION SYSTEMS ENGINEERING - WISE 2021, PT I, 2021, 13080 : 3 - 13
- [40] Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation (Practical Experience Report) 2022 IEEE 33RD INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2022), 2022, : 157 - 168