共 29 条
[1]
Probability of attack based on system vulnerability lif cycle. Jumratjaroenvanit, Amontip,tenq Amnuay. Proceedings of the Interational Symposium on electronic Commerce and security . 2008
[5]
Windows of Vulnerability: A Case Study Analysis. William A. Arbaugh,William L. Fithen,John McHugh. Computer . 2000
[6]
Quantitative software security risk assessment model. I. Mkpong-Ruffin,D. Umphress,J. Hamilton,J. Gilbert. Proceedings of the 2007 ACM workshop on Quality of protection . 2007
[7]
Quantifying security risk level from CVSS estimates of frequency and impact[J] . Siv Hilde Houmb,Virginia N.L. Franqueira,Erlend A. Engum.  The Journal of Systems & Software . 2009 (9)
[8]
National vulnerability database. NIST. https://nvd.nist.gov/ . 2018
[9]
Common vulnerabilities and exposures. CVE. http://cve.mitre.org/ . 2018
[10]
A large scale ex-ploratory analysis of software vulnerability life cycles. Muhammad Shahzad,M. Zubair Shafiq,Alex X. Liu. Proceedings of the 34th International Conference on Software Engineering(ICSE) . 2012