Journal of Software Engineering and Applications

Journal of Software Engineering and Applications

ISSN Print: 1945-3116
ISSN Online: 1945-3124
www.scirp.org/journal/jsea
E-mail: jsea@scirp.org
"Quantitative Security Evaluation for Software System from Vulnerability Database"
written by Hiroyuki Okamura, Masataka Tokuzane, Tadashi Dohi,
published by Journal of Software Engineering and Applications, Vol.6 No.4A, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Analyzing Interrelationships Among Software Vulnerabilities Using Fuzzy DEMATEL Approach
Reliability and Maintainability …, 2022
[2] Empirical Risk Assessment in Major Graphical Design Software Systems
Journal of Multimedia Information System, 2021
[3] Heterogeneous identity trust management method based on risk assessment
Journal of Intelligent & Fuzzy Systems, 2021
[4] A Large-Scale Study on Vulnerabilities in Linux using Vtopia
2021 IEEE 21st …, 2021
[5] Bug Bounty Marketplaces and Enabling Responsible Vulnerability Disclosure: An Empirical Analysis
2020
[6] Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities
2020
[7] Using variability modeling to support security evaluations: virtualizing the right attack scenarios
2020
[8] Bayesian-model averaging using MCMCBayes for web-browser vulnerability discovery
2019
[9] Some Guidelines for Risk Assessment of Vulnerability Discovery Processes
2019
[10] Комп'ютерне моделювання інформаційних систем в умовах конфліктних взаємодій
2019
[11] Vulnerability Discovery and Patch Modeling: State of the Art
2019
[12] 15 Vulnerability Discovery
2019
[13] A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
2018
[14] Multivariate models using MCMCBayes for web-browser vulnerability discovery
Reliability Engineering & System Safety, 2018
[15] Cluster-based vulnerability assessment of operating systems and web browsers
Computing Computing and Visualization in Science, 2018
[16] Cybersecurity: Probabilistic Behavior of Vulnerability and Life Cycle
2017
[17] Cluster-based Vulnerability Assessment Applied to Operating Systems
2017
[18] Enterprise security investment through time when facing different types of vulnerabilities
2017
[19] Web Site Accessibility, Quality and Vulnerability Assessment: a Survey of Government Web Sites in the Turkish Republic
Journal of Information Systems Engineering & Management, 2016
[20] Universities of the Kyrgyz Republic on the Web: accessibility and usability
Universal Access in the Information Society, 2016
[21] Assessing optimal patch release time for vulnerable software systems
2016
[22] Web site accessibility, usability and security: a survey of government web sites in Kyrgyz Republic
Universal Access in the Information Society, 2015
[23] Semantics-enabled user interest detection from twitter
2015
[24] Predicting Post-Release Software Security Fault Discovery Using Expert Judgment Elicitation and Bayesian Computed Effort-Dependent Models
RA Johnston - tujk2008.org, 2014
[25] Reverse Engineering Web Applications for Security Mechanism Enhancement
Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International. IEEE, 2014
[26] МОДЕЛЬ GM (1, 1)-МАРКОВА ДЛЯ ПРОГНОЗИРОВАНИЯ УЯЗВИМОСТЕЙ ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ
2013
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top