Details

Title

Trust and Risk Assessment Model of Popular Software Based on Known Vulnerabilities

Journal title

International Journal of Electronics and Telecommunications

Yearbook

2017

Volume

vol. 63

Issue

No 3

Authors

Divisions of PAS

Nauki Techniczne

Publisher

Polish Academy of Sciences Committee of Electronics and Telecommunications

Date

2017

Identifier

DOI: 10.1515/eletel-2017-0044 ; eISSN 2300-1933 (since 2013) ; ISSN 2081-8491 (until 2012)

Source

International Journal of Electronics and Telecommunications; 2017; vol. 63; No 3

References

Sans (2017), http isc sans edu diary access date, null, 20, 02. ; (2017), The Incident Response Center Luxembourg http cve circl lu - access date, Computer, 14, 02. ; (2017), Vulnerability lab http www vulnerability lab com access date, null, 21, 02. ; Vulners (2017), com https vulners com access date, null, 22, 02. ; Symantec (2017), http www symantec com securityresponse landing vulnerabilities jsp access date, null, 02. ; (2017), Exploit db http www exploit db com access date, null, 17, 02. ; Zhang (2011), An Emperical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities, null, 6860, doi.org/10.1007/978-3-642-23088-215 ; (2017), Tracker http www securitytracker com access date, Security, 12, 02. ; Fulldisclosure (2017), http seclists org fulldisclosure access date, null, 16, 02. ; (2016), Intelligent Exploit http www intelligentexploit com - access date currently not accessible, null, 18, 02. ; Vfeed (2017), https github com toolswatch vFeed access date, null, 23, 02. ; (2017), dcitionary https cpe mitre org access date, null, 24, 02. ; Felkner (2016), and analysis of sources of information about vulnerabilities telekomunikacyjny i wiadomoci telekomunikacyjne, Review, 8, 929, doi.org/10.15199/59.2016.8-9.37 ; (2017), US CERT vulnerability notes database http www kb cert org vuls - access date, null, 13, 02. ; Zhang (null), Predicting Cyber Risks through National Vulnerability Database Global Perspective, Information Security Journal, 1, doi.org/10.1080/19393555.2015.1111961 ; CVEdetails (2017), http www cvedetails com access date, null, 15, 02. ; Metasploit (2017), Rapid https www rapid com db access date, null, 19, 02. ; Ozment (2007), Vulnerability Discovery Software thesis University of, Security. ; Dragonsoft (2016), vulnerability database http vdb dragonsoft com - access date currently not accessible, null, 02. ; SecurityFocus (2017), http www securityfocus com vulnerabilities access date, null, 11, 02. ; Ingols (2009), Modeling modern network attacks and countermeasures using attack graphs, Annual Computer Security Conference, doi.org/10.1109/ACSAC.2009.21
×