First Page | Document Content | |
---|---|---|
![]() Date: 2015-05-01 17:51:11Computing Cyberwarfare Security Computer security Computer network security Hacking Software testing Common Weakness Enumeration Vulnerability database Attack Common Vulnerabilities and Exposures Architecture tradeoff analysis method | Add to Reading List |
![]() | Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang YaDocID: 1quHb - View Document |
![]() | Architectural Analysis for Security (AAFS)DocID: 1qpdp - View Document |
![]() | PDF DocumentDocID: 1pSl7 - View Document |
![]() | PDF DocumentDocID: 1pwU6 - View Document |
![]() | NIST SPRevision 3, The Technical Specification for SCAP Version 1.3DocID: 1puNg - View Document |