Author of the publication

Evaluating CVSS Base Score Using Vulnerability Rewards Programs.

, , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 62-75. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Case Study: Using Project Based Learning to Develop Parallel Programing and Soft Skills., , , and . IPDPS Workshops, page 304-311. IEEE, (2019)Evaluating CVSS Base Score Using Vulnerability Rewards Programs., , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 62-75. Springer, (2016)To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit., , , and . CODASPY, page 97-104. ACM, (2016)Empirical Characterization of the Likelihood of Vulnerability Discovery., , and . Int. J. Perform. Eng., 16 (7): 1008-1018 (2020)Developing parallel programming and soft skills: A project based learning approach., , , and . J. Parallel Distributed Comput., (2021)Mapping Zero-Click Attack Behavior into MITRE ATT&CK Mobile: A Systematic Process., , , and . CSCI, page 890-896. IEEE, (2022)A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems., and . QRS Companion, page 426-433. IEEE, (2020)Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System., and . QRS, page 252-261. IEEE, (2015)Using Software Structure to Predict Vulnerability Exploitation Potential., and . SERE (Companion), page 13-18. IEEE, (2014)Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach., , and . DSA, page 302-311. IEEE, (2023)