Quantitative economics of security : software vulnerabilities and data breaches
@inproceedings{Algarni2016QuantitativeEO, title={Quantitative economics of security : software vulnerabilities and data breaches}, author={Abdullah Algarni}, year={2016} }
................................................................................................................................... ii ACKNOWLEDGEMENTS .............................................................................................................v LIST OF TABLES ......................................................................................................................... ix LIST OF FIGURES… CONTINUE READING
Figures, Tables, and Topics from this paper
Figures and Tables
figure 2.1 figure 2.2 figure 2.3 figure 2.4 figure 2.5 figure 2.6 figure 3.1 table 3.1 table 3.2 figure 3.2 figure 4.1 table 4.1 figure 4.2 figure 4.4 table 5.1 table 5.7 table 6.1 table 6.10 table 6.11 table 6.12 table 6.13 table 6.14 table 6.15 table 6.16 table 6.17 table 6.18 table 6.19 table 6.2 table 6.20 table 6.21 table 6.22 table 6.23 table 6.24 figure 6.4 table 6.5 figure 6.5 table 6.6 figure 6.6 table 6.7 table 6.9 table II table VI table VI
One Citation
References
SHOWING 1-10 OF 49 REFERENCES
A Quest for a Framework to Improve Software Security : Vulnerability Black Markets Scenario
- 2009
- 5
- Highly Influential
- PDF
Modelling the Security Ecosystem- The Dynamics of (In)Security
- Computer Science, Business
- WEIS
- 2009
- 67
- PDF
A Vulnerability Life Cycle-Based Security Modeling and Evaluation Approach
- Computer Science
- Comput. J.
- 2013
- 9
- PDF
A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST
- Computer Science
- 2007
- 400
- Highly Influential
- PDF
A large scale exploratory analysis of software vulnerability life cycles
- Computer Science, Engineering
- 2012 34th International Conference on Software Engineering (ICSE)
- 2012
- 136
- Highly Influential
- PDF
The dark side of vulnerability exploitation: a proposal for a research analysis. ?
- Engineering
- 2012
- 2
- PDF
Before we knew it: an empirical study of zero-day attacks in the real world
- Computer Science
- CCS
- 2012
- 395
- PDF