共 35 条
[1]
Automated Generation of Attack Graphs Using NVD
[J].
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18),
2018,
:135-142
[2]
Threat Modeling for Cloud Data Center Infrastructures
[J].
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016,
2017, 10128
:302-319
[3]
[Anonymous], 1979, Information Retrieval
[4]
[Anonymous], 2022, Securing the Software Supply Chain: Recommended Practices Guide for Developers, P64
[5]
[Anonymous], 2018, ISO Standard
[6]
Basili G, 1994, Encyclopedia of Software Engineering
[7]
Berger Bernhard J., 2016, Engineering Secure Software and Systems. 8th International Symposium, ESSoS 2016. Proceedings: LNCS 9639, P56, DOI 10.1007/978-3-319-30806-7_4
[8]
Common Weakness Enumeration (CWE), about us
[9]
CVE, About us
[10]
CVSS SIG, About us