Open Access
MATEC Web Conf.
Volume 210, 2018
22nd International Conference on Circuits, Systems, Communications and Computers (CSCC 2018)
Article Number 02010
Number of page(s) 5
Section Systems
Published online 05 October 2018
  1. ISO/IEC, Information technology - Security techniques-Information security risk management” ISO/IEC FIDIS 27005:2008 [Google Scholar]
  2. Joint Task Force Transformation Initiative, Guide for Conducting Risk Assessments, NIST, [Online] +, (2012) [Google Scholar]
  3. Network Working Group, Internet Security Glossary, [Online], (2000) [Google Scholar]
  4. P. Mell, K. Scarfone, S. Romanosky, A Complete Guide to the Common Vulnerability Scoring System, NIST, [Online], (2007) [Google Scholar]
  5. P. Mell, K. Scarfone, The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities, NIST Int. Rep. 7502, (2010) [Google Scholar]
  6. E. LeMay, K. Scarfone, P. Mell, “The Common Misuse Scoring System (CMSS): Metrics for Software Misuse Vulnerabilities,” NIST Int. Rep. 7864, (2012) [Google Scholar]
  7. P. S. Anton, R. H. Anderson, R Mesic, M. Scheiern, Finding and Fixing Vulnerabilities in Information Systems: The Vulnerability Assessment and Mitigation Methodology, RAND, Pittsburgh, (2003) [Google Scholar]
  8. R. Kasprzyk, A. Stachurski, A concept of standard-based vulnerability management automation for IT systems, Comp. Sc. and Math. Mod., 3, 33-38, (2016) [CrossRef] [Google Scholar]
  9. O. H. Alhazmi, Y. K. Malaiya, I. Ray, Measuring, analyzing and predicting security vulnerabilities in software systems, Comp. & Sec., 26, 219-228, (2007) [CrossRef] [Google Scholar]
  10. The MITRE Corporation, Common Weakness Scoring System (CWSS™), [Online], (2014) [Google Scholar]
  11. A. K. Shrivastava, R. Sharma, P. K. Kapur, Vulnerability Discovery Model for a Software System Using Stochastic Differential Equation, Proc. of 2015 1st Int. Conf. on Fut. tr. in Com. An. and Kn. Man. (ABLAZE-2015), IEEE, Amity University Greater Noida, 199-205, (2015) [Google Scholar]
  12. R. Hoffmann, Vulnerability Discovery Models for a Software System Using Stochastic Differential Equations, Rocz. Koleg. An. Eko. / S.G.H, 45, 177-187, (2017) [Google Scholar]
  13. E. Rescorla, Is Finding Security Holes a Good Idea?, IEEE Sec. and Pri., 3, 1, 14-19, (2005) [CrossRef] [Google Scholar]
  14. A.L. Goel, K. Okumoto, Time-Dependent Error Detection Rate Model for Software and Other Performance Measures, IEEE Tr. on Rel., R 28, 3, 206-211, (1979) [CrossRef] [Google Scholar]
  15. S. A. DeLurgio, Forecasting principles and applications, University of Missouri-Kansas City, Irwin/McGraw-Hill, 1998. [Google Scholar]
  16. H. Tomaszek, M. Wróblewski, Podstawy oceny efektywności eksploatacji systemów uzbrojenia lotniczego, Bellona, Warsaw (2001). [Google Scholar]
  17. M. Zieja, A method of predicting reliability and lifetime of aeronautical hardware with characteristic function applied. Transport Means - Proceedings of the International Conference, Kaunas, 22-23 October 2015. Kaunas Univ. Technol. [Google Scholar]
  18. M. Zieja, M. Ważny, S. Stępień, Distribution determination of time of exceeding permissible condition as used to determine lifetimes of selected aeronautical devices/systems. Eksploatacja i Niezawodnosc-Maintenance and Reliability, 18(1), 57-64 (2016). [CrossRef] [Google Scholar]
  19. J. Żurek, Z. Smalko, M. Zieja, Methods applied to identify causes of air events. Reliability, Risk and Safety: Theory and Applications. CRC Press-Taylor and Francis Group, 1817-1822, (2010). [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.