共 50 条
- [1] Cybersecurity Programs in Saudi Arabia: Issues and Recommendations 2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
- [2] Bug Bounty Programs - a Mapping Study 2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 412 - 415
- [3] The Rules of Engagement for Bug Bounty Programs FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 138 - 159
- [4] An Empirical Study of Bug Bounty Programs PROCEEDINGS OF THE 2020 IEEE 2ND INTERNATIONAL WORKSHOP ON INTELLIGENT BUG FIXING (IBF '20), 2020, : 35 - 44
- [5] Understanding the Heterogeneity of Contributors in Bug Bounty Programs 11TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2017), 2017, : 223 - 228
- [6] Security Professional Skills Representation in Bug Bounty Programs and Processes SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 334 - 348
- [7] Navigating vulnerability markets and bug bounty programs: A public policy perspective INTERNET POLICY REVIEW, 2024, 13 (01):
- [8] Beyond the Bugs: Enhancing Bug Bounty Programs through Academic Partnerships 19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,