Is open source security a myth?
G Schryen - Communications of the ACM, 2011 - dl.acm.org
Is open source security a myth? Page 1 130 communications of the acm | May 2011 | vol. 54 |
no. 5 contributed articles doi:10.1145/1941487.1941516 What does vulnerability and patch …
no. 5 contributed articles doi:10.1145/1941487.1941516 What does vulnerability and patch …
Descriptive analytics: Examining expert hackers in web forums
In recent years, understanding the people behind cybercrime from a hacker-centric
perspective has drawn increased attention. Preliminary exploration in online hacker social …
perspective has drawn increased attention. Preliminary exploration in online hacker social …
Bug bounty marketplaces and enabling responsible vulnerability disclosure: an empirical analysis
Cybercrime caused by exploited vulnerabilities bears a huge burden on societies. Most of
these vulnerabilities are detectable, and the damage is preventable if software vendors and …
these vulnerabilities are detectable, and the damage is preventable if software vendors and …
A study of a social behavior inside the online black markets
J Radianti - 2010 Fourth International Conference on Emerging …, 2010 - ieeexplore.ieee.org
Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible
damage on computer-based environments. Lately, online black market sites for trading …
damage on computer-based environments. Lately, online black market sites for trading …
Cyber autonomy: automating the hacker–self-healing, self-adaptive, automatic cyber defense systems and their impact on industry, society, and national security
RKL Ko - Emerging Technologies and International Security, 2020 - taylorfrancis.com
In 2016, the Defense Advanced Research Projects Agency hosted the Cyber Grand
Challenge, a competition which invited participating finalist teams to develop automated …
Challenge, a competition which invited participating finalist teams to develop automated …
Idiographic digital profiling: Behavioral analysis based on digital forensics
CM Steel - Journal of Digital Forensics, Security and Law, 2014 - commons.erau.edu
Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital
forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by …
forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by …
[KİTAP][B] Emerging technologies and international security
While recent technological developments, such as artificial intelligence (AI), robotics, and
automation, have the potential to transform international relations in positive ways, they also …
automation, have the potential to transform international relations in positive ways, they also …
Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures
More and more people use search engines to seek for various information. This study
investigates the search behavior that drives the search for information security knowledge …
investigates the search behavior that drives the search for information security knowledge …
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits
Context Software vulnerabilities in general, and software vulnerabilities with publicly
available exploits in particular, are important to manage for both developers and users. This …
available exploits in particular, are important to manage for both developers and users. This …
Tracking criminals on facebook: A case study from a digital forensics reu program
D Weiss, G Warner - 2015 - commons.erau.edu
Abstract The 2014 Digital Forensics Research Experience for Undergraduates (REU)
Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on …
Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on …