From post

The (Un)Reliability of NVD Vulnerable Versions Data: an Empirical Experiment on Google Chrome Vulnerabilities

, и . Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, стр. 493--498. (мая 2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exptime Tableaux for ALC., , и . Description Logics, том WS-96-05 из AAAI Technical Report, стр. 107-110. AAAI Press, (1996)Diversity: A Poor Man's Solution to Drone Takeover., , и . PECCS, стр. 25-34. SciTePress, (2017)An Empirical Methodology to Evaluate Vulnerability Discovery Models., и . IEEE Trans. Software Eng., 40 (12): 1147-1162 (2014)DES: a Challenge Problem for Nonmonotonic Reasoning Systems, , и . CoRR, (2000)What the heck is this application doing? - A security-by-contract architecture for pervasive services., , , и . Comput. Secur., 28 (7): 566-577 (2009)Then and Now: On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned., , и . IEEE Trans. Emerg. Top. Comput., 4 (1): 35-46 (2016)Selecting a Secure Cloud Provider - An Empirical Study and Multi Criteria Approach., , , и . Information, 11 (5): 261 (2020)IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation., , , , и . IEEE Secur. Priv., 13 (5): 52-61 (2015)TestREx: a framework for repeatable exploits., , , и . Int. J. Softw. Tools Technol. Transf., 21 (1): 105-119 (2019)Verifying security protocols as planning in logic programming., и . ACM Trans. Comput. Log., 2 (4): 542-580 (2001)