共 50 条
- [1] Multics security evaluation: Vulnerability analysis 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 127 - 146
- [2] Evaluation of Security Lifecycle for the Quantitative Analysis ICHIT 2008: INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 727 - 731
- [3] A model for quantitative security measurement and prioritisation of vulnerability mitigation Tripathi, A. (anshu_tripathi@yahoo.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (08):
- [5] Hierarchical Quantitative Evaluation of Vulnerability Exploitability 2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 115 - 118
- [6] A Method for Vulnerability Database Quantitative Evaluation CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 61 (03): : 1129 - 1144
- [7] Analysis of Chinese Energy Security Based on Quantitative Evaluation Method APPLIED ENERGY TECHNOLOGY, PTS 1 AND 2, 2013, 724-725 : 1206 - 1210
- [8] Network Security Architecture Based on Vulnerability Evaluation ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 104 - 109
- [9] Evaluation of Security Vulnerability Severity Based on CMAHP 2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1056 - 1060