[1] |
LIU Q X , ZHANG Y Q . VRSS:a new system for rating and scoring vulnerabilities[J]. Computer Communications, 2011,34(3): 264-273.
|
[2] |
ZHAO D Y , FURNELL S M,AL-AYED A . The research on a patch management system for enterprise vulnerability update[A]. Proc of Information Engineering,WASE International Sonference:2[C]. Taiyuan,China, 2009. 250-253.
|
[3] |
MUNIR R , AWAN I , MUFTI M R . A quantitative measure of the security risk level of enterprise networks[A]. Proc of Broadband and Wireless Computing,Communication and Applications(BWCCA),2013 Eighth International Conference[C].Compiegne:IEEE. 2013. 437-442.
|
[4] |
WU W , YIP F , YIU E ,et al. Integrated vulnerability management system for enterprise networks[A]. Proc of e-Technology,e-Commerce and e-Service,The 2005 IEEE International Conference[C]. IEEE, 2005. 698-703.
|
[5] |
SHAHZAD M , SHAFIQ M Z , LIU A X . A large scale exploratory analysis of software vulnerability life cycles[A]. Software Engineering(ICSE),2012 34th International Conference[C]. IEEE, 2012. 771-781.
|
[6] |
BM internet security systems[EB/OL]. .
|
[7] |
NSFocus[EB/OL]. .
|
[8] |
National vulnerability database[EB/OL]. .
|
[9] |
张玉清, 吴舒平, 刘奇旭 ,等. 国家安全漏洞库的设计与实现[J]. 通信学报, 2011,32(6): 93-100. ZHANG Y Q , WU S P , LIU Q X ,et al. Design and implementation of national security vulnerability database[J]. Journal on Communications, 2011,32(6): 93-100.
|
[10] |
OKAMURA H , TOKUZANE M , DOHI T . Security evaluation for software system with vulnerability life cycle and user profiles[A]. Dependable Transportation Systems/Recent Advances in Software Dependability(WDTS-RASD)[C]. IEEE, 2012. 39-44.
|
[11] |
LIU Q X , ZHANG Y Q , KONG Y ,et al. Improving VRSS-based vulnerability prioritization uusing analytic hierarchy process[J]. Journal of Systems and Software, 2012,85(8): 1699-1708.
|
[12] |
WANG L Y K , SUSHIL J , ANOOP S ,et al. K-zero day safety:a network security metric for measuring the risk of unknown vulnerabilities[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(1): 30-44.
|
[13] |
GHANI H , LUNA J , KHELIL A . Predictive vulnerability scoring in the context of insufficient information availability[A]. Proc of Risks and Security of Internet and Systems(CRiSIS),2013 International Conference La Rochelle[C]. IEEE, 2013. 1-8.
|
[14] |
ALVI A K , ZULKERNINE M . A natural classification scheme for software security patterns[A]. Dependable,Autonomic and Secure Computing(DASC),2011 IEEE Ninth International Conference[C]. IEEE, 2011. 113-120.
|
[15] |
VENTER H S , ELOFF J H P , LI Y L . Standardising vulnerability categories[J]. Computers and Security, 2008,27(3-4): 71-83.
|
[16] |
CHEN Z Q , ZHANG Y , CHEN Z R . A categorization framework for common computer vulnerabilities and exposures[J]. The Computer Journal, 2010,53(5): 551-580.
|
[17] |
TRIPATHI A , SINGH U K . On prioritization of vulnerability categories based on CVSS scores[A]. Computer Sciences and Convergence Information Technology(ICCIT),2011 6th International Conference[C]. IEEE, 2011. 692-697.
|
[18] |
ZHENG C , ZHANG Y Q , SUN Y F ,et al. IVDA:international vulnerability database alliance[A]. Proc of Cybersecurity Summit(WCS),2011 Second Worldwide[C]. London,UK, 2011. 1-6.
|
[19] |
WANG J A , ZHOU L F , GUO M Z ,et al. Measuring similarity for security vulnerabilities[A]. Proc of System Sciences(HICSS),2010 43rd Hawaii International Conference[C]. Honolulu, 2010. 1-10.
|
[20] |
KOCATEKIN T , ISTANBUL T , UNAY D . Text mining in radiology reports[A]. Proc of Signal Processing and Communications Applications Conference(SIU),2013 21st[C]. Haspolat, 2013. 1-4.
|
[21] |
ABDUL-RAHMAN S , MUTALIB S , KHANAFI N A . Exploring feature selection and support vector machine in text categorization[A]. Proc of Computational Science and Engineering(CSE),2013 IEEE 16th International Conference[C]. Sydney,NSW, 2013. 1101-1104.
|
[22] |
Security content automation protocol[EB/OL]. .
|
[23] |
Common vulnerabilities and exposures[EB/OL]. .
|
[24] |
MELL P , SCARFONE K , ROMANOSKY S . Common vulnerability scoring system[J]. Security and Privacy, 2006,4(16): 85-89.
|
[25] |
ARNOLD A D , HYLA B M , ROWE N C . Automatically building an information-security vulnerability database[A]. Proc of Automatically Building an Information-Security Vulnerability Database[C]. West Point,NY, 2006. 376-377.
|
[26] |
GU Y H , LI PEI . Design and research on vulnerability database[A]. Proc of Information and Computing(ICIC),2010 Third International Conference:2[C]. Wuxi,China, 2010. 209-212.
|
[27] |
王晓甜, 张玉清 . 安全漏洞自动收集系统的设计与实现[J]. 计算机工程, 2006,32(20): 177-179. WANG X T , ZHANG Y Q . Design and implementation of security vulnerability auto-collection system[J]. Computer Engineering, 2006,32(20): 177-179.
|