Software Analysis: A Road Map, Chinese Journal of Computers.Vol, vol.32, issue.9, pp.1697-1710, 2009. ,
A Taxonomy of Causes of Software Vulnerabilities in Internet Software, Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSR'02), 2002. ,
A Taxonomy of Security Faults in the Unix Operating System, 1995. ,
Susceptibility matrix: a new aid to software auditing, IEEE Security & Privacy Magazine, vol.2, issue.2, pp.16-21, 2004. ,
DOI : 10.1109/MSECP.2004.1281240
A taxonomy of computer program security flaws, ACM Computing Surveys, vol.26, issue.3, pp.211-254, 1994. ,
DOI : 10.1145/185403.185412
Paradkar: A Software Flaw Taxonomy: Aiming Tools at Security, Proceedings of the 2005 Software Engineering for Secure Systems (SESS'05), 2005. ,
Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors, IEEE Security and Privacy Magazine, vol.3, issue.6, pp.81-84, 2005. ,
DOI : 10.1109/MSP.2005.159
Current and Future Danger: A CSI Primer on Computer Crime and Information Warfare, 1996. ,
Computer Vulnerability Analysis, 1998. ,
Categorization of Software Errors that Lead to Security Breaches, Proceedings of the 21st National Information Systems Security Conference, 1998. ,
A Taxonomy of Unix System and Network Vulnerabilities, 1995. ,
Information system attacks: A preliminary classification scheme, Computers & Security, vol.16, issue.1, pp.26-49, 1997. ,
DOI : 10.1016/S0167-4048(97)85785-9
A defense-centric taxonomy based on attack manifestations, International Conference on Dependable Systems and Networks, 2004, 2004. ,
DOI : 10.1109/DSN.2004.1311881
A taxonomy of network and computer attacks, Computers & Security, vol.24, issue.1, pp.31-43, 2005. ,
DOI : 10.1016/j.cose.2004.06.011
A Grammar-based Fault Classification Scheme and Its Application to the Classification of the Errors of Tex, 1995. ,
Towards a Taxonomy of Vulnerabilities, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007. ,
DOI : 10.1109/HICSS.2007.566
Research on Classification Attributes of Software Vulnerability, Computer Engineering, vol.36, issue.1, pp.184-186, 2010. ,