The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (2007 vol. 5)
ISSN: 1540-7993
pp: 28-32
Jeffrey R. Jones , Microsoft
Any given piece of software has some number of publicly disclosed vulnerabilities at any moment, leaving the system exposed to potential attack. The author presents a method for identifying and analyzing these vulnerabilities using public data from easily accessible sources.
software vulnerabilities, vulnerability disclosure, data, Microsoft
Jeffrey R. Jones, "Estimating Software Vulnerabilities", IEEE Security & Privacy, vol. 5, no. , pp. 28-32, July/August 2007, doi:10.1109/MSP.2007.81
84 ms
(Ver 3.3 (11022016))