4.3 Article

Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Proceedings Paper Computer Science, Interdisciplinary Applications

CrimeBB: Enabling Cybercrime Research on Underground Forums at Scale

Sergio Pastrana et al.

WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)

Proceedings Paper Computer Science, Information Systems

Economic Factors of Vulnerability Trade and Exploitation

Luca Allodi

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Artificial Intelligence

An automatic method for CVSS score prediction using vulnerabilities description

Atefeh Khazaei et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2016)

Proceedings Paper Computer Science, Information Systems

MISP - The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform

Cynthia Wagner et al.

WISCS'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON INFORMATION SHARING AND COLLABORATIVE SECURITY (2016)

Article Computer Science, Information Systems

Common vulnerability, scoring system

Peter Mell et al.

IEEE SECURITY & PRIVACY (2006)