[1]
|
An Environment-Specific Prioritization Model for Information-Security Vulnerabilities Based on Risk Factor Analysis
Electronics,
2022
DOI:10.3390/electronics11091334
|
|
|
[2]
|
Collaboration or separation maximizing the partnership between a “Gray hat” hacker and an organization in a two-stage cybersecurity game
International Journal of Information Management Data Insights,
2022
DOI:10.1016/j.jjimei.2022.100073
|
|
|
[3]
|
A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation
2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C),
2022
DOI:10.1109/QRS-C57518.2022.00015
|
|
|
[4]
|
A Stochastic Model for Calculating Well-Founded Probabilities of Vulnerability Exploitation
2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C),
2022
DOI:10.1109/QRS-C57518.2022.00015
|
|
|
[5]
|
A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities
2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA),
2020
DOI:10.1109/TPS-ISA50397.2020.00012
|
|
|
[6]
|
Automated Software Vulnerability Assessment with Concept Drift
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR),
2019
DOI:10.1109/MSR.2019.00063
|
|
|
[7]
|
The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay
2018 Sixth International Symposium on Computing and Networking (CANDAR),
2018
DOI:10.1109/CANDAR.2018.00009
|
|
|
[8]
|
Non-Homogeneous Stochastic Model for Cyber Security Predictions
Journal of Information Security,
2018
DOI:10.4236/jis.2018.91002
|
|
|
[9]
|
Cybersecurity: Time Series Predictive Modeling of Vulnerabilities of Desktop Operating System Using Linear and Non-Linear Approach
Journal of Information Security,
2017
DOI:10.4236/jis.2017.84023
|
|
|