共 36 条
- [1] Bug Bounty Programs - a Mapping Study [J]. 2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 412 - 415
- [2] An Empirical Study of Bug Bounty Programs [J]. PROCEEDINGS OF THE 2020 IEEE 2ND INTERNATIONAL WORKSHOP ON INTELLIGENT BUG FIXING (IBF '20), 2020, : 35 - 44
- [3] The Rules of Engagement for Bug Bounty Programs [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 138 - 159
- [4] Understanding the Heterogeneity of Contributors in Bug Bounty Programs [J]. 11TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2017), 2017, : 223 - 228
- [6] Navigating vulnerability markets and bug bounty programs: A public policy perspective [J]. INTERNET POLICY REVIEW, 2024, 13 (01):
- [8] Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
- [9] What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study [J]. SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2019, 2021, 11739 : 89 - 106
- [10] Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report [J]. PROCEEDINGS OF THE 2024 CONFERENCE INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, VOL 1, ITICSE 2024, 2024, : 227 - 233