-
1Academic Journal
المؤلفون: Federico Niccolò Ricotta
المصدر: Rivista Italiana di Informatica e Diritto, Vol 6, Iss 1, Pp 55-58 (2024)
مصطلحات موضوعية: vulnerability disclosure, penetration testing, cybersicurezza, responsabilità penale, coordinated vulnerability disclosure (cvd), Law, Cybernetics, Q300-390
وصف الملف: electronic resource
-
2Conference
المؤلفون: Fiorinelli, Gaia, Zucca, Maria Vittoria
المساهمون: Gianni D'Angelo, Flaminia Luccio, Francesco Palmieri, Fiorinelli, Gaia, Zucca, Maria Vittoria
مصطلحات موضوعية: Ethical hacking, Vulnerability disclosure, Cybercrime, Cybersecurity, Criminal Law, Criminology
وصف الملف: ELETTRONICO
Relation: ispartofbook:Proceedings of the 8th Italian Conference on Cyber Security (ITASEC 2024) Salerno, Italy, April 8-12, 2024; 8th Italian Conference on Cyber Security (ITASEC 2024); volume:3731; firstpage:1; lastpage:16; numberofpages:16; serie:CEUR WORKSHOP PROCEEDINGS; alleditors:Gianni D'Angelo, Flaminia Luccio, Francesco Palmieri; https://hdl.handle.net/11382/567712
-
3Academic Journal
المؤلفون: Liurong Zhao, Xiaoxi Yu, Xinyu Zhou
المصدر: Mathematical Biosciences and Engineering, Vol 20, Iss 11, Pp 19012-19039 (2023)
مصطلحات موضوعية: cybersecurity, vulnerability disclosure behavior, regulatory mechanism, third-party crowdsourcing cybersecurity testing platform, white-hat hackers, tripartite evolutionary game, Biotechnology, TP248.13-248.65, Mathematics, QA1-939
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1551-0018
-
4Academic Journal
المساهمون: Derecho Internacional Público, Penal y Procesal
المصدر: Information and Communications Technology Law, 2022
مصطلحات موضوعية: White hat hacking, Delphi study, penetration test, cyber security, bug bounty programs, coordinated vulnerability disclosure
وصف الملف: application/pdf
Relation: http://hdl.handle.net/10498/28712
-
5Academic Journal
المؤلفون: ZHOU, Jiayuan, PACHECO, Michael, CHEN, Jinfu, HU, Xing, XIA, Xin, LO, David, HASSAN, Ahmed E.
المصدر: Research Collection School Of Computing and Information Systems
مصطلحات موضوعية: Contrastive learning, Data augmentation, Disclosure policies, Down-stream, OSS vulnerability, Potential impacts, Security advisories, User need, Vulnerability disclosure, Vulnerability remediations, Databases and Information Systems, Information Security
وصف الملف: application/pdf
Relation: https://ink.library.smu.edu.sg/sis_research/8513; https://ink.library.smu.edu.sg/context/sis_research/article/9516/viewcontent/CoLeFunDa_Explainable_Silent_Vulnerability_Fix_Identification.pdf
-
6Academic Journal
المؤلفون: Evan Grau, Logan Mullen, Hannah Burrows, Anna Stancofski
مصطلحات موضوعية: Computer Engineering, Computer Communications Networks, CPGs - Method for Measuring Impact, Remediated, CPG, NIST, TTP, Impact, cost, Cross-Sector Cybersecurity Performance Goals: Impact, default passwords, asset inventory, Detecting Relevant Threats and TTPs, Vulnerability Disclosure/Reporting, Incident Planning and Preparedness, cybersecurity engineering, cybersecurity, CERT, research
-
7Academic Journal
المؤلفون: Robin Bolz, Reiner Kriesten
المصدر: Journal of Cybersecurity and Privacy, Vol 1, Iss 2, Pp 274-288 (2021)
مصطلحات موضوعية: automotive security, vulnerability disclosure, threat intelligence, Technology (General), T1-995
وصف الملف: electronic resource
-
8Report
المؤلفون: Bozzini, David
المساهمون: Université de Fribourg = University of Fribourg (UNIFR)
المصدر: https://hal.science/hal-04068476 ; 2023.
مصطلحات موضوعية: Bug Bounty, Cybersecurity, Hacking, Vulnerability Disclosure, Market, Social Anthropology, Ethical Hackers, STS, Digital Infrastructure, History, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [SHS]Humanities and Social Sciences, [SHS.ANTHRO-SE]Humanities and Social Sciences/Social Anthropology and ethnology, [SHS.HISPHILSO]Humanities and Social Sciences/History, Philosophy and Sociology of Sciences
Relation: hal-04068476; https://hal.science/hal-04068476; https://hal.science/hal-04068476/document; https://hal.science/hal-04068476/file/Bozzini_Ethical_Hacking_History.pdf
-
9Academic Journal
المؤلفون: Stoykova, Radina, Nordvik, Rune, Ahmed, Munnazzar, Franke, Katrin, Axelsson, Stefan, Toolan, Fergus
المصدر: Stoykova , R , Nordvik , R , Ahmed , M , Franke , K , Axelsson , S & Toolan , F 2022 , ' Legal and technical questions of file system reverse engineering ' , Computer Law & Security Review , vol. 46 , 105725 . https://doi.org/10.1016/j.clsr.2022.105725
مصطلحات موضوعية: Criminal procedure, Digital Forensics, Government Vulnerability Disclosure, Intellectual Property, Reverse Engineering
وصف الملف: application/pdf
الاتاحة: https://hdl.handle.net/11370/8b6da29c-224b-4f56-9243-4a864ee170a8
https://research.rug.nl/en/publications/8b6da29c-224b-4f56-9243-4a864ee170a8
https://doi.org/10.1016/j.clsr.2022.105725
https://pure.rug.nl/ws/files/622496599/1_s2.0_S0267364922000693_main.pdf
http://www.scopus.com/inward/record.url?scp=85135877635&partnerID=8YFLogxK -
10Conference
المؤلفون: Suleder, J, Truxius, D
المصدر: 65th Annual Meeting of the German Association for Medical Informatics, Biometry and Epidemiology (GMDS), Meeting of the Central European Network (CEN: German Region, Austro-Swiss Region and Polish Region) of the International Biometric Society (IBS); 20200906-20200909; Berlin; DOCAbstr. 239 /20210226/
مصطلحات موضوعية: cybersecurity, hacking, safety, coordinated vulnerability disclosure, ddc: 610
Relation: Bundesinstitut für Arzneimittel und Medizinprodukte (BfArM). Dringende Sicherheitsinformation zu Insulinpumpe DANA Diabecare RS;mobilen Anwendung AnyDANA von SOOIL Development Co. Ltd. 2020 [Accessed 15 July 2020]. Available from: https://www.bfarm.de/SharedDocs/Kundeninfos/DE/07/2020/17203-19_kundeninfo_de.pdf; Cybersecurity and Infrastructure Security Agency (CISA). ICS Medical Advisory (ICSMA-21-012-01) - SOOIL DANA Diabecare RS. Jan 2021. Available from: https://us-cert.cisa.gov/ics/advisories/icsma-21-012-01; Federal Office for Information Security (BSI). Report on the State of IT Security in Germany 2019. 2019 [Accessed 15 July 2020]. Available from: https://www.bsi.bund.de/EN/Publications/SecuritySituation/SecuritySituation_node.html; Federal Office for Information Security (BSI). Medizintechnik. 2019 [Accessed 15 July 2020]. Available from: https://www.bsi.bund.de/DE/Themen/DigitaleGesellschaft/eHealth/Medizintechnik/Projekte/Projekte_node.html; Food and Drug Administration (FDA). Postmarket Management of Cybersecurity in Medical Devices. 2016 [Accessed 15 July 2020]. Available from: https://www.fda.gov/regulatory-information/search-fda-guidance-documents/postmarket-management-cybersecurity-medical-devices; German Federal Office for Information Security (BSI). Cyber Security Requirements for Network-Connected Medical Devices. 2018 [Accessed 15 July 2020]. Available from: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ICS/Medical_Devices_CS-E_132.pdf?__blob=publicationFile&v=2; Newman L. These Hackers Made an App That Kills to Prove a Point. WIRED. 2019 [Accessed 15 July 2020]. Available from: https://www.wired.com/story/medtronic-insulin-pump-hack-app/; SPECTARIS Deutscher Industriebverband für Optik, Photonik, Analysen- und Medizintechnik e.V. Die deutsche Medizintechnik-Industrie: SPECTARIS Jahrbuch 2019/2020. 2019 [Accessed 15 July 2020]. Available from: https://www.spectaris.de/fileadmin/Content/Medizintechnik/Zahlen-Fakten-Publikationen/SPECTARIS_Jahrbuch_2019-2020.pdf; Suleder J, Kauer B, Emmerich N, Pavlidis R. ERNW Whitepaper 69: Safety Impact of Vulnerabilities in Insulin Pumps. Sep 2020. Available from: https://ernw.de/en/whitepapers/issue-69.html; The European Commission. MDCG 2019-16 - Guidance on Cybersecurity for medical devices. 2019 [Accessed 15 July 2020]. Available from: https://ec.europa.eu/docsroom/documents/41863; http://dx.doi.org/10.3205/20gmds161; http://nbn-resolving.de/urn:nbn:de:0183-20gmds1611; http://www.egms.de/en/meetings/gmds2020/20gmds161.shtml
-
11Conference
المساهمون: Wellman, Lawrence
المصدر: Conference: International Workshop on Security Measurements and Metrics,Banff, Canada,09/21/2011,09/21/2011
وصف الملف: Medium: ED; Size: 96
-
12Academic Journal
المؤلفون: Gardenier, Anne Marte
المساهمون: de la Iglesia, Daniel H., de Paz Santana, Juan F., López Rivero, Alfonso J.
المصدر: Gardenier , A M 2024 , Strengthening the Role of Citizens in Governing Disruptive Technologies : The Case of Dutch Volunteer Hackers . in D H de la Iglesia , J F de Paz Santana & A J López Rivero (eds) , New Trends in Disruptive Technologies, Tech Ethics, and Artificial Intelligence : The DITTET 2024 Collection . Advances in Intelligent Systems and Computing (AISC) , vol. 1459 , Springer , Cham , pp. 399-409 . https://doi.org/10.1007/978-3-031-66635-3_35
مصطلحات موضوعية: Socially disruptive technologies, cybersecurity governance, citizen participation, volunteer hackers, vulnerability disclosure
Relation: https://research.tue.nl/en/publications/56ea2185-1294-4cb6-8ddb-e48d6aaaa56a; urn:ISBN:978-3-031-66634-6
-
13Academic Journal
المؤلفون: Sylvain Besençon, David Bozzini
المصدر: Swiss Journal of Sociocultural Anthropology, Vol 25 (2020)
مصطلحات موضوعية: cybersecurity, vulnerability disclosure, digital ethnography, ethnographic location, encryption, controversy, Ethnology. Social and cultural anthropology, GN301-674
وصف الملف: electronic resource
-
14Academic Journal
المصدر: Crime Science, Vol 7, Iss 1, Pp 1-9 (2018)
مصطلحات موضوعية: Coordinated vulnerability disclosure, Responsible disclosure, Interdisciplinary, Bug bounty, Rational choice theory, Criminal motives, Science (General), Q1-390, Social pathology. Social and public welfare. Criminology, HV1-9960
وصف الملف: electronic resource
-
15Conference
المؤلفون: Jo, Arrah-Marie
المساهمون: Môle Armoricain de Recherche sur la SOciété de l'information et des usages d'INternet (MARSOUIN), Université de Rennes (UR)-Université de Bretagne Sud (UBS)-Ecole Nationale de la Statistique et de l'Analyse de l'Information Bruz (ENSAI)-Université de Brest (UBO)-Institut Mines-Télécom Paris (IMT)-Université de Rennes 2 (UR2)-Université Bretagne Loire (UBL)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom Paris (IMT), Laboratoire d'Economie et de Gestion de l'Ouest (LEGO), Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Institut Mines-Télécom Paris (IMT)-Institut Brestois des Sciences de l'Homme et de la Société (IBSHS), Université de Brest (UBO)-Université Bretagne Loire (UBL)-IMT Atlantique (IMT Atlantique), Département Logique des Usages, Sciences sociales et Sciences de l'Information (IMT Atlantique - LUSSI), IMT Atlantique (IMT Atlantique), Institut Mines-Télécom Paris (IMT)-Institut Mines-Télécom Paris (IMT), Boston College, Harvard University
المصدر: Workshop on the Economics of Information Security (WEIS 2019) ; https://hal.science/hal-03033198 ; Workshop on the Economics of Information Security (WEIS 2019), Boston College; Harvard University, Jun 2019, Boston, MA, United States ; weis2019.econinfosec.org
مصطلحات موضوعية: information security economics, software vulnerability disclosure, vulnerability discovery, software security, JEL: D - Microeconomics/D.D2 - Production and Organizations/D.D2.D22 - Firm Behavior: Empirical Analysis, JEL: D - Microeconomics/D.D8 - Information, Knowledge, and Uncertainty/D.D8.D83 - Search • Learning • Information and Knowledge • Communication • Belief • Unawareness, JEL: L - Industrial Organization/L.L8 - Industry Studies: Services/L.L8.L86 - Information and Internet Services • Computer Software, [SHS.ECO]Humanities and Social Sciences/Economics and Finance, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [SHS.INFO]Humanities and Social Sciences/Library and information sciences
جغرافية الموضوع: Boston, MA, United States
Relation: hal-03033198; https://hal.science/hal-03033198; https://hal.science/hal-03033198/document; https://hal.science/hal-03033198/file/Paper_DisclosureAndSecurity.pdf
-
16Academic Journal
المؤلفون: Asuka NAKAJIMA, Eitaro SHIOJI, Maverick WOO, Mitsuaki AKIYAMA, Takuya WATANABE
المصدر: IEICE Transactions on Information and Systems. 2020, E103.D(7):1524
-
17
المؤلفون: SpringJonathan, HouseholderAllen
المصدر: Digital Threats: Research and Practice. 3:1-28
مصطلحات موضوعية: Measure (data warehouse), Actuarial science, Computer Networks and Communications, Hardware and Architecture, Vulnerability, Performance indicator, Psychology, Safety Research, Vulnerability disclosure, Software, Computer Science Applications, Information Systems
-
18
المؤلفون: Aviv Zohar, Neha Narula, Tim Ruffing, Rainer Böhme, Lisa Eckey, Tyler Moore
المصدر: Communications of the ACM. 63:62-71
مصطلحات موضوعية: Cryptocurrency, General Computer Science, business.industry, 020204 information systems, Internet privacy, 0202 electrical engineering, electronic engineering, information engineering, 020206 networking & telecommunications, 02 engineering and technology, business, Vulnerability disclosure
-
19
المؤلفون: Maverick Woo, Eitaro Shioji, Mitsuaki Akiyama, Takuya Watanabe, Asuka Nakajima
المصدر: IEICE Transactions on Information and Systems. :1524-1540
مصطلحات موضوعية: Exploit, Artificial Intelligence, Hardware and Architecture, Computer science, business.industry, Internet privacy, Computer Vision and Pattern Recognition, Electrical and Electronic Engineering, business, Internet of Things, Vulnerability disclosure, Software
-
20
المؤلفون: Huskaj, Gazmend, Wilson, Richard L.
المصدر: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020 Proceedings of the International Conference on Cyber Warfare and Security. :254-261
مصطلحات موضوعية: Anticipatory Ethics, Ethical Dilemma, Information Systems, Iran Nuclear Program, Stuxnet, Vulnerabilities, Zero-Days, Computer crime, Information use, Nuclear reactors, Uranium, Hardware and software, Programming errors, Vulnerability disclosure, Zero day vulnerabilities, Ethical aspects, Informationssystem (IS)
وصف الملف: print
URL الوصول: https://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18417
https://www.academic-bookshop.com/ourshop/prod_7115710-ICCWS-2020-PDF-Proceedings-of-the-15th-International-Conference-on-Cyber-Warfare-and-Security.html