:::

詳目顯示

回上一頁
題名:A Component-based Architecture for Software Vulnerability Management
書刊名:醒吾學報
作者:劉家驊
作者(外文):Liu, Chia-hwa
出版日期:2014
卷期:49
頁次:頁139-148
主題關鍵詞:軟體漏洞元件為基架構安全軟體知識庫Software vulnerabilityComponent-based architectureSecure softwareKnowledge base
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:17
期刊論文
1.Luse, A.、Scheibe, K. P.、Townsend, A. M.(2008)。A Component-Based Framework for Visualization of Intrusion Detection Events。Information Security Journal,17,95-107。  new window
2.Pironti, John P.(2006)。Key Elements of a Threat and Vulnerability Management Program。ISACA。  new window
3.Santini, Diego Caberlon、Lages, Walter Fetter(2011)。A component based architecture for robot control。Revista Controle & Automação,22(4)。  new window
4.Arora, Ashish、Telang, Rahul、Xu, Hao(2008)。Optimal Policy for Software Vulnerability Disclosure。Management Science,54(4),642-656。  new window
5.Arora, Ashish、Nandkumar, Anand、Telang, Rahul(2006)。Does Information Security Attack Frequency Increase With Vulnerability Disclosure? An Empirical Analysis。Information System Frontiers,8(5),350-362。  new window
會議論文
1.Jurriaan, S.、van Mierloo, Martin(2008)。A Component Based Architecture for Web Content Management: Runtime Deployable WebManager Component Bundles。8th international conference on web engineering。  new window
2.Radianti, Jaziar、Gonzalez, Jose J.、Rich, Eliot(2009)。A Quest for a Framework to Improve Software Security: Vulnerability Black Markets Scenario。Albuquerque, USA。  new window
其他
1.Anna-Maija Juuso and Ari Takanen Unknown Vulnerability Management,http://www.codenomicon.com/resources/whitepapers/codenomicon-wp-unknown-vulnerabiIity-management-20101019.pdf。  new window
2.Browne, H. K.,William, A. A.,John, M.,William, L. F.(2000)。A Trend Analysis of exploitations,http://www.cs.umd.edu/~waa/pubs/CS-TR-4200.pdf。  new window
3.Symantec Global Internet Threat Report: Trend for July - Dec 07,http://eval.symantec.com/mktginfo/enterprise/white_papers/bwhitepaper-internet_security_threat_report_xiii_04-2008.en-us.pdf。  new window
4.Symantec Report on Underground Economy,http://evaI.symantec.com/mktginfo/enterprise/white_papers/bwhitepaper_undergroundeconomyreportl 1-2008-14525717.en-us.pdf。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top