注册
/
登录
高级搜索
开启搜索历史记录
删除搜索历史记录.
搜索历史记录选项已关闭,请开启搜索历史记录选项。
我的图书馆
Your browser does not support JavaScript, or it is disabled. JavaScript must be enabled in order to view listings.
Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties
作者: Ming Ng ,
Kiran Sridhar
DOI:
10.1093/CYBSEC/TYAB007
关键词:
摘要:
保存
引用
反馈
分享
想要
索引来源
3
下载资源
1
oup.com
本地加速
doi.org
本地加速
uni-trier.de
本地加速
sci-hub.st
HTML
下载加速
参考文章
(22)
1.
J. D. Sargan,
THE ESTIMATION OF ECONOMIC RELATIONSHIPS USING INSTRUMENTAL VARIABLES
Econometrica.
,vol. 26, pp. 393- ,(1958) ,
10.2307/1907619
2.
Wolter Pieters, Dina Hadžiosmanović, Francien Dechesne,
Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace
Science and Engineering Ethics.
,vol. 22, pp. 831- 850 ,(2016) ,
10.1007/S11948-015-9648-Y
3.
E Gabriella Coleman, Alex Golub, None,
Hacker practice: Moral genres and the cultural articulation of liberalism
Anthropological Theory.
,vol. 8, pp. 255- 277 ,(2008) ,
10.1177/1463499608093814
4.
Ray C. Fair,
The Estimation of Simultaneous Equation Models with Lagged Endogenous Variables and First Order Serially Correlated Errors
Econometrica.
,vol. 38, pp. 507- 516 ,(1970) ,
10.2307/1909556
5.
Tyler Moore, Rainer Böhme,
The “Iterated Weakest Link” Model of Adaptive Security Investment
Journal of Information Security.
,vol. 07, pp. 81- 102 ,(2016) ,
10.4236/JIS.2016.72006
6.
T.J. Ostrand, E.J. Weyuker, R.M. Bell,
Predicting the location and number of faults in large software systems
IEEE Transactions on Software Engineering.
,vol. 31, pp. 340- 355 ,(2005) ,
10.1109/TSE.2005.49
7.
Laura J. Kornish,
Technology choice and timing with positive network effects
European Journal of Operational Research.
,vol. 173, pp. 268- 282 ,(2006) ,
10.1016/J.EJOR.2004.12.004
8.
Valerie A. Ramey,
Identifying Government Spending Shocks: It's all in the Timing*
Quarterly Journal of Economics.
,vol. 126, pp. 1- 50 ,(2011) ,
10.1093/QJE/QJQ008
9.
David McKinney,
Vulnerability Bazaar
ieee symposium on security and privacy.
,vol. 5, pp. 69- 73 ,(2007) ,
10.1109/MSP.2007.180
10.
Basit Shahzad, Abdullatif M. Abdullatif, Naveed Ikram, Atif Mashkoor,
Build Software or Buy: A Study on Developing Large Scale Software
IEEE Access.
,vol. 5, pp. 24262- 24274 ,(2017) ,
10.1109/ACCESS.2017.2762729
来源期刊
Journal of Cybersecurity
Oxford University Press (OUP)
2021 年,
Volume: 7, Issue: 1,
Page:
相似文章
0
我的图书馆
我的账户
注册
登录
Copyright 2023 ©KipHub.
高级搜索
查找文章
包含所有这些词
包含完全匹配的短语
包含至少一个这些词
不包含这些词
词语出现的位置
任意位置
标题中
显示以下作者所著的文章:
例如:
丁肇中
或
"PJ Hayes"
显示以下刊物上的文章:
例如:
《学术探索》
或
《Nature》
显示在此期间发表的文章:
—
例如:
1996
百变星君
加载中...