Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties

作者: Ming Ng , Kiran Sridhar

DOI: 10.1093/CYBSEC/TYAB007

关键词:

摘要:

参考文章(22)
J. D. Sargan, THE ESTIMATION OF ECONOMIC RELATIONSHIPS USING INSTRUMENTAL VARIABLES Econometrica. ,vol. 26, pp. 393- ,(1958) , 10.2307/1907619
Wolter Pieters, Dina Hadžiosmanović, Francien Dechesne, Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace Science and Engineering Ethics. ,vol. 22, pp. 831- 850 ,(2016) , 10.1007/S11948-015-9648-Y
E Gabriella Coleman, Alex Golub, None, Hacker practice: Moral genres and the cultural articulation of liberalism Anthropological Theory. ,vol. 8, pp. 255- 277 ,(2008) , 10.1177/1463499608093814
Tyler Moore, Rainer Böhme, The “Iterated Weakest Link” Model of Adaptive Security Investment Journal of Information Security. ,vol. 07, pp. 81- 102 ,(2016) , 10.4236/JIS.2016.72006
T.J. Ostrand, E.J. Weyuker, R.M. Bell, Predicting the location and number of faults in large software systems IEEE Transactions on Software Engineering. ,vol. 31, pp. 340- 355 ,(2005) , 10.1109/TSE.2005.49
Laura J. Kornish, Technology choice and timing with positive network effects European Journal of Operational Research. ,vol. 173, pp. 268- 282 ,(2006) , 10.1016/J.EJOR.2004.12.004
Valerie A. Ramey, Identifying Government Spending Shocks: It's all in the Timing* Quarterly Journal of Economics. ,vol. 126, pp. 1- 50 ,(2011) , 10.1093/QJE/QJQ008
David McKinney, Vulnerability Bazaar ieee symposium on security and privacy. ,vol. 5, pp. 69- 73 ,(2007) , 10.1109/MSP.2007.180
Basit Shahzad, Abdullatif M. Abdullatif, Naveed Ikram, Atif Mashkoor, Build Software or Buy: A Study on Developing Large Scale Software IEEE Access. ,vol. 5, pp. 24262- 24274 ,(2017) , 10.1109/ACCESS.2017.2762729