First Page | Document Content | |
---|---|---|
Date: 2015-05-01 17:51:11Computing Cyberwarfare Security Computer security Computer network security Hacking Software testing Common Weakness Enumeration Vulnerability database Attack Common Vulnerabilities and Exposures Architecture tradeoff analysis method | Architectural Analysis for Security (AAFS)Add to Reading ListSource URL: resources.sei.cmu.eduDownload Document from Source WebsiteFile Size: 1,48 MBShare Document on Facebook |
Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang YaDocID: 1quHb - View Document | |
Architectural Analysis for Security (AAFS)DocID: 1qpdp - View Document | |
PDF DocumentDocID: 1pSl7 - View Document | |
PDF DocumentDocID: 1pwU6 - View Document | |
NIST SPRevision 3, The Technical Specification for SCAP Version 1.3DocID: 1puNg - View Document |