Predicting vulnerable software components with dependency graphs VH Nguyen, LMS Tran Proceedings of the 6th International Workshop on Security Measurements and …, 2010 | 132 | 2010 |
Which is the right source for vulnerability studies? an empirical analysis on mozilla firefox F Massacci, VH Nguyen Proceedings of the 6th international workshop on security measurements and …, 2010 | 78 | 2010 |
The (un) reliability of nvd vulnerable versions data: An empirical experiment on google chrome vulnerabilities VH Nguyen, F Massacci Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 60 | 2013 |
An Empirical Methodology to Validate Vulnerability Discovery Models F Massacci, VH Nguyen IEEE Transactions on Software Engineering, 2014 | 59 | 2014 |
An automatic method for assessing the versions affected by a vulnerability VH Nguyen, S Dashevskyi, F Massacci Empirical Software Engineering 21, 2268-2297, 2016 | 48 | 2016 |
After-life vulnerabilities: a study on firefox evolution, its vulnerabilities, and fixes F Massacci, S Neuhaus, VH Nguyen Engineering Secure Software and Systems: Third International Symposium …, 2011 | 47 | 2011 |
No purpose, no data: Goal-oriented access control forambient assisted living F Massacci, VH Nguyen, A Saidane Proceedings of the first ACM workshop on Security and privacy in medical and …, 2009 | 19 | 2009 |
An independent validation of vulnerability discovery models VH Nguyen, F Massacci Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 17 | 2012 |
A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases. VH Nguyen, TK Dang J. Softw. 3 (4), 9-16, 2008 | 13 | 2008 |
Query assurance verification for dynamic outsourced XML databases VH Nguyen, TK Dang, NT Son, J Kung The Second International Conference on Availability, Reliability and …, 2007 | 12 | 2007 |
An idea of an independent validation of vulnerability discovery models VH Nguyen, F Massacci Engineering Secure Software and Systems: 4th International Symposium, ESSoS …, 2012 | 7 | 2012 |
Goal-oriented access control model for ambient assisted living F Massacci, V Hung Nguyen Privacy and Identity Management for Life: 5th IFIP WG 9.2, 9.6/11.4, 11.6 …, 2010 | 7 | 2010 |
Empirical Methods for Evaluating Vulnerability Models VH Nguyen University of Trento, 2014 | | 2014 |
Do Vulnerability Studies Make Sense? F Massacci, S Neuhaus, VH Nguyen | | |
The (Un) Reliability of NVD Vulnerable Versions Data: an Empirical Experiment on Browsers’ Vulnerabilities VH Nguyen, F Massacci | | |
THE EVOLUTION OF SOFTWARE VULNERABILITIES VH Nguyen | | |