共 50 条
- [1] Bug Bounty Programs - a Mapping Study [J]. 2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 412 - 415
- [2] The Rules of Engagement for Bug Bounty Programs [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 138 - 159
- [3] Understanding the Heterogeneity of Contributors in Bug Bounty Programs [J]. 11TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2017), 2017, : 223 - 228
- [5] Security Professional Skills Representation in Bug Bounty Programs and Processes [J]. SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 334 - 348
- [6] What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study [J]. SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2019, 2021, 11739 : 89 - 106
- [7] Navigating vulnerability markets and bug bounty programs: A public policy perspective [J]. INTERNET POLICY REVIEW, 2024, 13 (01):
- [10] Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,