Is open source security a myth?

G Schryen - Communications of the ACM, 2011 - dl.acm.org
Is open source security a myth? Page 1 130 communications of the acm | May 2011 | vol. 54 |
no. 5 contributed articles doi:10.1145/1941487.1941516 What does vulnerability and patch …

Descriptive analytics: Examining expert hackers in web forums

A Abbasi, W Li, V Benjamin, S Hu… - 2014 IEEE Joint …, 2014 - ieeexplore.ieee.org
In recent years, understanding the people behind cybercrime from a hacker-centric
perspective has drawn increased attention. Preliminary exploration in online hacker social …

Bug bounty marketplaces and enabling responsible vulnerability disclosure: an empirical analysis

HC Subramanian, S Malladi - Journal of Database Management …, 2020 - igi-global.com
Cybercrime caused by exploited vulnerabilities bears a huge burden on societies. Most of
these vulnerabilities are detectable, and the damage is preventable if software vendors and …

A study of a social behavior inside the online black markets

J Radianti - 2010 Fourth International Conference on Emerging …, 2010 - ieeexplore.ieee.org
Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible
damage on computer-based environments. Lately, online black market sites for trading …

Cyber autonomy: automating the hacker–self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national security

RKL Ko - Emerging Technologies and International Security, 2020 - taylorfrancis.com
In 2016, the Defense Advanced Research Projects Agency hosted the Cyber Grand
Challenge, a competition which invited participating finalist teams to develop automated …

Idiographic digital profiling: Behavioral analysis based on digital forensics

CM Steel - Journal of Digital Forensics, Security and Law, 2014 - commons.erau.edu
Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital
forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by …

[KİTAP][B] Emerging technologies and international security

R Steff, J Burton, SR Soare - 2020 - api.taylorfrancis.com
While recent technological developments, such as artificial intelligence (AI), robotics, and
automation, have the potential to transform international relations in positive ways, they also …

Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures

J Wang, N **ao, HR Rao - ACM Transactions on Management …, 2010 - dl.acm.org
More and more people use search engines to seek for various information. This study
investigates the search behavior that drives the search for information security knowledge …

A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits

H Holm, M Korman, M Ekstedt - Information and Software Technology, 2015 - Elsevier
Context Software vulnerabilities in general, and software vulnerabilities with publicly
available exploits in particular, are important to manage for both developers and users. This …

Tracking criminals on facebook: A case study from a digital forensics reu program

D Weiss, G Warner - 2015 - commons.erau.edu
Abstract The 2014 Digital Forensics Research Experience for Undergraduates (REU)
Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on …