Articolul precedent |
Articolul urmator |
652 0 |
SM ISO690:2012 BORTĂ, Grigorii. Vulnerability Life Cycle Analysis. In: Information Technologies and Security: 2012, 15-16 octombrie 2012, Chișinău. Chișinău, Republica Moldova: Consiliul Naţional pentru Acreditare şi Atestare, 2012, pp. 309-316. |
EXPORT metadate: Google Scholar Crossref CERIF DataCite Dublin Core |
Information Technologies and Security 2012 | ||||||
Conferința "Information Technologies and Security" Chișinău, Moldova, 15-16 octombrie 2012 | ||||||
|
||||||
Pag. 309-316 | ||||||
|
||||||
Descarcă PDF | ||||||
Rezumat | ||||||
The paper represents an analysis of a number of sources regarding vulnerability markets, vulnerability prices, companies that sell or buy vulnerabilities, companies that conduct research in the domain. |
||||||
Cuvinte-cheie software vulnerability, shadow information economics, underground economy, malware |
||||||
|
DataCite XML Export
<?xml version='1.0' encoding='utf-8'?> <resource xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xmlns='http://datacite.org/schema/kernel-3' xsi:schemaLocation='http://datacite.org/schema/kernel-3 http://schema.datacite.org/meta/kernel-3/metadata.xsd'> <creators> <creator> <creatorName>Bortă, G.R.</creatorName> <affiliation>Banca Naţională a Moldovei, Moldova, Republica</affiliation> </creator> </creators> <titles> <title xml:lang='en'>Vulnerability Life Cycle Analysis</title> </titles> <publisher>Instrumentul Bibliometric National</publisher> <publicationYear>2012</publicationYear> <relatedIdentifier relatedIdentifierType='ISBN' relationType='IsPartOf'></relatedIdentifier> <subjects> <subject>software vulnerability</subject> <subject>shadow information economics</subject> <subject>underground economy</subject> <subject>malware</subject> </subjects> <dates> <date dateType='Issued'>2012</date> </dates> <resourceType resourceTypeGeneral='Text'>Conference Paper</resourceType> <descriptions> <description xml:lang='en' descriptionType='Abstract'><p>The paper represents an analysis of a number of sources regarding vulnerability markets, vulnerability prices, companies that sell or buy vulnerabilities, companies that conduct research in the domain.</p></description> </descriptions> <formats> <format>application/pdf</format> </formats> </resource>