Cited By
View all- Sotos Martínez EVillanueva NOrellana L(2021)A Survey on the State of the Art of Vulnerability Assessment Techniques14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)10.1007/978-3-030-87872-6_20(203-213)Online publication date: 22-Sep-2021
- Cao YDong YWei XWu X(2019)AADL Vulnerability Modeling and Security Analysis Method2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C)10.1109/QRS-C.2019.00080(399-406)Online publication date: Jul-2019
- Jinan SKefeng PXuefeng CJunfu Z(2017)Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)10.1109/BigDataSecurity.2017.9(18-25)Online publication date: May-2017
- Show More Cited By