Vulnerability Discovery Model
Appearance
![]() | This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
No issues specified. Please specify issues, or remove this template. |
Vulnerability Discovery Model (VDM) is used to estimate future vulnerability discovery process/trend. There are several VDMs:
- Alhazmi-Malaiya: Time based model (Alhazmi-Malaiya Logistic (AML) model)[1]
- Alhazmi-Malaiya: Effort based model[1]
- Rescorla: Quadratic Model and Exponential Model [2]
- Anderson: Thermodynamic Model[3]
- Kim: Weibull Model[4]
- Linear Model
References
- ^ a b O. H. Alhazmi and Y. K. Malaiya, “Quantitative vulnerability assessment of systems software,” in Proc. Annual Reliability and Maintainability Symposium, January 2005, pp. 615–620.
- ^ E. Rescola, “Is finding security holes a good idea?,” Security and Privacy, pp. 14–19, Jan./Feb. 2005.
- ^ R. J. Anderson, “Security in open versus closed systems—The dance of Boltzmann, Coase and Moore,” in Open Source Software: Economics, Law and Policy. Toulouse, France: , June 20–21, 2002.
- ^ HyunChul Joh, Jinyoo Kim, Yashwant K. Malaiya, "Vulnerability Discovery Modeling Using Weibull Distribution," issre, pp.299-300, 2008 19th International Symposium on Software Reliability Engineering, 2008.
This article has not been added to any content categories. Please help out by adding categories to it so that it can be listed with similar articles. (June 2009) |