Survey of software vulnerability taxonomies
From MaRDI portal
Publication:3406969
DOI10.3724/SP.J.1087.2008.02244zbMATH Open1180.68121WikidataQ120809692 ScholiaQ120809692MaRDI QIDQ3406969FDOQ3406969
Authors: Qingkai Zeng
Publication date: 20 February 2010
Published in: Journal of Computer Applications (Search for Journal in Brave)
Recommendations
Cited In (6)
- Neural software vulnerability analysis using rich intermediate graph representations of programs
- Title not available (Why is that?)
- A taxonomy for identifying requirement interactions in software systems
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- Prioritising vulnerabilities using ANP and evaluating their optimal discovery and patch release time
This page was built for publication: Survey of software vulnerability taxonomies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3406969)