共 14 条
[1]
Yamada S., Reliability/safety evaluation of software, Safety Eng, 33, pp. 432-441, (1994)
[2]
Gwandu B.A.L., Creasey D.J., Using formal methods in design for reliability as applied to an electronic system that in tegrates software and hardware to perform a function, Microelectronic Reliable, 8, 35, pp. 1111-1124, (1995)
[3]
Ma J., Research of electronic business security based on public key encryption methods, International Journal of Advancements in Computing Technology (IJACT), 4, 2, pp. 50-57, (2012)
[4]
Jiang Y., Jiang D., The security assessment method of wireless sensor network with interval grey linguistic variables, International Journal of Advancements in Computing Technology (IJACT), 3, 10, pp. 85-91, (2011)
[5]
He X., Jun Z., Chang L., A Survey on Research of Software Safety Test, Computer Measurement& Control, 19, 3, pp. 493-496, (2011)
[6]
Wang A.J., Wang H., Guo M., Xia M., Security Metrics for Software Systems, Proceedings of the ACMSE '09 March, pp. 19-21, (2009)
[7]
Liu Q., Zhang Y., VRSS: A new system for rating and scoring vulnerabilities, Computer Communications, 34, pp. 264-273, (2011)
[8]
Chambers J., Thompson J., Common Vulnerability Scoring System, (2004)
[9]
Mell P., Scarfone K., Romanosky S., A Complete Guide to The Common Vulnerability Scoring System, (2007)
[10]
Yong-Zheng Z., Xiao-Chun Y., Ming-Zeng H., Research on privilege-escalating based vulnerability taxonomy with multidimensional quantitative attribute, Journal of China Institute of Communications, 25, 7, pp. 102-110, (2004)