共 11 条
[1]
Susceptibility matrix:A new aid to software auditing. Jiwnani K,Zelkowitz M. IEEE Security and Privacy . 2004
[2]
Vulnerability Testing of Software System Using Fault Injection. Du Wenliang,Mathur A P. Coast TR98-02 . 1998
[3]
Vulnerabilities analysis. Bishop M. Proceedings of Recent Ad-vances in Intrusion Detection . 1999
[4]
Software Vulnerability Analysis. I.Krsul. . 1998
[5]
Cross-site scripting worms and viruses:The impending threat and the best defense. Grossman J. http://www.whitehatsec.com/downloads/WHXSSThreats.pdf .
[6]
A taxonomy of causes of software vulnerabilities in in-ternet software. Piessens F. Supplementary Proceedings of the13th Interna-tional Symposium on Software Reliability Engineering . 2002
[7]
A software flaw taxonomy:Ai-ming tools at security. Weber S,Karger P A,Paradkar A. Software Engineering at Secure Systems-Building Trustworthy Application (sSESS’05) . 2005
[8]
Towards a taxonomy of vulnerabilities. Bazaz A,Arthur J. Pro-ceedings of the40th Annual Hawaii International Conference on System Sciences (HICSS’07) . 2007
[9]
A taxonomy of computer program security flaws. Landwehr C E,Bull A R,Mcdermoll J P,et al. . 1994
[10]
Common Vulnerability Enumeration. http://cve.mitre.org/cve/index.html .