"Quantitative Security Evaluation for Software System from Vulnerability Database"
written by Hiroyuki Okamura, Masataka Tokuzane, Tadashi Dohi,
published by Journal of Software Engineering and Applications, Vol.6 No.4A, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Bug Bounty Marketplaces and Enabling Responsible Vulnerability Disclosure: An Empirical Analysis
2020
[2] Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities
2020
[3] Using variability modeling to support security evaluations: virtualizing the right attack scenarios
2020
[4] Комп'ютерне моделювання інформаційних систем в умовах конфліктних взаємодій
2019
[5] Some Guidelines for Risk Assessment of Vulnerability Discovery Processes
2019
[6] Bayesian-model averaging using MCMCBayes for web-browser vulnerability discovery
2019
[7] A Multivariate Bayesian Approach to Modeling Vulnerability Discovery in the Software Security Lifecycle
2018
[8] Cluster-based vulnerability assessment of operating systems and web browsers
Computing Computing and Visualization in Science, 2018
[9] Multivariate models using MCMCBayes for web-browser vulnerability discovery
Reliability Engineering & System Safety, 2018
[10] Enterprise security investment through time when facing different types of vulnerabilities
2017
[11] Cluster-based Vulnerability Assessment Applied to Operating Systems
2017
[12] Cybersecurity: Probabilistic Behavior of Vulnerability and Life Cycle
2017
[13] Assessing optimal patch release time for vulnerable software systems
2016
[14] Universities of the Kyrgyz Republic on the Web: accessibility and usability
Universal Access in the Information Society, 2016
[15] Web Site Accessibility, Quality and Vulnerability Assessment: a Survey of Government Web Sites in the Turkish Republic
Journal of Information Systems Engineering & Management, 2016
[16] Web site accessibility, usability and security: a survey of government web sites in Kyrgyz Republic
Universal Access in the Information Society, 2015
[17] Reverse Engineering Web Applications for Security Mechanism Enhancement
Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International. IEEE, 2014
[18] Predicting Post-Release Software Security Fault Discovery Using Expert Judgment Elicitation and Bayesian Computed Effort-Dependent Models
RA Johnston - tujk2008.org, 2014
[19] МОДЕЛЬ GM (1, 1)-МАРКОВА ДЛЯ ПРОГНОЗИРОВАНИЯ УЯЗВИМОСТЕЙ ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ
2013
[20] ORCID: 0000-0002-8017-3184 (2018)