Cited By
View all- Yee G(2018)Removing Software Vulnerabilities During Design2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)10.1109/COMPSAC.2018.10284(504-509)Online publication date: Jul-2018
- Román Muñoz FGarcía Villalba L(2018)An algorithm to find relationships between web vulnerabilitiesThe Journal of Supercomputing10.1007/s11227-016-1770-374:3(1061-1089)Online publication date: 1-Mar-2018
- Ojameruaye BBahsoon RWainwright RCorchado JBechini AHong J(2015)A risk - aware framework for compliance goal-obstacle analysisProceedings of the 30th Annual ACM Symposium on Applied Computing10.1145/2695664.2696053(1401-1402)Online publication date: 13-Apr-2015
- Show More Cited By