1 – 8 of 8
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 2021
-
Mark
Communicating Cybersecurity Vulnerability Information: A Producer-Acquirer Case Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Using Program Analysis to Identify the Use of Vulnerable Functions
2021) p.520-530(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2020
-
Mark
Automated CPE Labeling of CVE Summaries with Machine Learning
2020) 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 12223 LNCS. p.3-22(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Evaluation of the HAVOSS software process maturity model
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2019
-
Mark
Sharing of vulnerability information among companies - a survey of Swedish companies
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2018
-
Mark
Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components
2018) International Conference on on Product-Focused Software Process Improvement (PROFES 2018) In Lecture Notes in Computer Science 11271. p.81-97(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 2016
-
Mark
Exploiting Trust in Deterministic Builds
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding