Systematization of Knowledge from Intrusion Detection Models |
|
Attack Surface and Defense-in-Depth Metrics |
|
Developing Security Metrics |
|
spro15-munaiahA.pdf |
|
Are_Intrusion_Detection_Studies_Evaluated_Consistently-_A_Systema.pdf |
|
On the Disconnect between CVSS Scores and Vulnerability Bounties |
|
ESEM_90.pdf |
|
ESEM_90.pdf |
|