共 28 条
[1]
DENNING D E R., Cryptography and data security, pp. 191-265, (1982)
[2]
LONGLEY D, SHAIN M, CAELLI W., Information security: Dictionary of concepts, standards and terms, pp. 9-23, (1992)
[3]
BISHOP M, BAILEY D., A critical analysis of vulnerability taxonomies: CSE-96-11, pp. 1-15, (1996)
[4]
KISSEL R., Glossary of key information security terms: NIST IR 7298 Revision 2, pp. 212-213, (2013)
[5]
Information security technology-glossary: GB/T25069—2010, pp. 42-43, (2011)
[6]
SHIREY R., Internet security glossary, version 2: FYI, RFC 4949, pp. 333-334, (2007)
[7]
YUAN Z M, XIAO Y, WU W, Et al., Research on the software vulnerability analysis architecture with the knowledge, exploration and state plane, Journal of Cyber Security, 4, 6, pp. 10-33, (2019)
[8]
SHAHMEHRI N, MAMMAR A, DE OCA E M, Et al., An advanced approach for modeling and detecting software vulnerabilities, Information and Software Technology, 54, 9, pp. 997-1013, (2012)
[9]
WANG J, GUO M M, CAMARGO J., An ontological approach to computer system security, Information Security Journal: A Global Perspective, 19, 2, pp. 61-73, (2010)
[10]
MU D L., A research on vulnerability discovery, identification and diagnosis, pp. 1-2, (2019)