| 期刊論文1. | Luse, A.、Scheibe, K. P.、Townsend, A. M.(2008)。A Component-Based Framework for Visualization of Intrusion Detection Events。Information Security Journal,17,95-107。 | 2. | Pironti, John P.(2006)。Key Elements of a Threat and Vulnerability Management Program。ISACA。 | 3. | Santini, Diego Caberlon、Lages, Walter Fetter(2011)。A component based architecture for robot control。Revista Controle & Automação,22(4)。 | 4. | Arora, Ashish、Telang, Rahul、Xu, Hao(2008)。Optimal Policy for Software Vulnerability Disclosure。Management Science,54(4),642-656。 | 5. | Arora, Ashish、Nandkumar, Anand、Telang, Rahul(2006)。Does Information Security Attack Frequency Increase With Vulnerability Disclosure? An Empirical Analysis。Information System Frontiers,8(5),350-362。 | 會議論文1. | Jurriaan, S.、van Mierloo, Martin(2008)。A Component Based Architecture for Web Content Management: Runtime Deployable WebManager Component Bundles。8th international conference on web engineering。 | 2. | Radianti, Jaziar、Gonzalez, Jose J.、Rich, Eliot(2009)。A Quest for a Framework to Improve Software Security: Vulnerability Black Markets Scenario。Albuquerque, USA。 | 其他1. | Anna-Maija Juuso and Ari Takanen Unknown Vulnerability Management,http://www.codenomicon.com/resources/whitepapers/codenomicon-wp-unknown-vulnerabiIity-management-20101019.pdf。 | 2. | Browne, H. K.,William, A. A.,John, M.,William, L. F.(2000)。A Trend Analysis of exploitations,http://www.cs.umd.edu/~waa/pubs/CS-TR-4200.pdf。 | 3. | Symantec Global Internet Threat Report: Trend for July - Dec 07,http://eval.symantec.com/mktginfo/enterprise/white_papers/bwhitepaper-internet_security_threat_report_xiii_04-2008.en-us.pdf。 | 4. | Symantec Report on Underground Economy,http://evaI.symantec.com/mktginfo/enterprise/white_papers/bwhitepaper_undergroundeconomyreportl 1-2008-14525717.en-us.pdf。 | |