Application of Vulnerability Discovery Models to Major Operating Systems. Alhazmi, O. H. & Malaiya, Y. K. IEEE Transactions on Reliability, 57(1):14-22, 2008. Link Paper bibtex @article{ journals/tr/AlhazmiM08,
added-at = {2008-11-04T00:00:00.000+0100},
author = {Alhazmi, Omar H. and Malaiya, Yashwant K.},
biburl = {http://www.bibsonomy.org/bibtex/22693bc4281279c2d05f422b3a82137f5/dblp},
date = {2008-11-04},
description = {dblp},
ee = {http://dx.doi.org/10.1109/TR.2008.916872},
interhash = {dda79c5a60308e25a9a2430c05183ecb},
intrahash = {2693bc4281279c2d05f422b3a82137f5},
journal = {IEEE Transactions on Reliability},
keywords = {dblp},
number = {1},
pages = {14-22},
title = {Application of Vulnerability Discovery Models to Major Operating Systems.},
url = {http://dblp.uni-trier.de/db/journals/tr/tr57.html#AlhazmiM08},
volume = {57},
year = {2008}
}
Downloads: 0
{"_id":"yefAkwYfexM3LR3M9","bibbaseid":"alhazmi-malaiya-applicationofvulnerabilitydiscoverymodelstomajoroperatingsystems-2008","downloads":0,"creationDate":"2015-04-13T13:27:51.655Z","title":"Application of Vulnerability Discovery Models to Major Operating Systems.","author_short":["Alhazmi, O.<nbsp>H.","Malaiya, Y.<nbsp>K."],"year":2008,"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/yashwant?items=1000","bibdata":{"added-at":"2008-11-04T00:00:00.000+0100","author":["Alhazmi, Omar H.","Malaiya, Yashwant K."],"author_short":["Alhazmi, O.<nbsp>H.","Malaiya, Y.<nbsp>K."],"bibtex":"@article{ journals/tr/AlhazmiM08,\n added-at = {2008-11-04T00:00:00.000+0100},\n author = {Alhazmi, Omar H. and Malaiya, Yashwant K.},\n biburl = {http://www.bibsonomy.org/bibtex/22693bc4281279c2d05f422b3a82137f5/dblp},\n date = {2008-11-04},\n description = {dblp},\n ee = {http://dx.doi.org/10.1109/TR.2008.916872},\n interhash = {dda79c5a60308e25a9a2430c05183ecb},\n intrahash = {2693bc4281279c2d05f422b3a82137f5},\n journal = {IEEE Transactions on Reliability},\n keywords = {dblp},\n number = {1},\n pages = {14-22},\n title = {Application of Vulnerability Discovery Models to Major Operating Systems.},\n url = {http://dblp.uni-trier.de/db/journals/tr/tr57.html#AlhazmiM08},\n volume = {57},\n year = {2008}\n}","bibtype":"article","biburl":"http://www.bibsonomy.org/bibtex/22693bc4281279c2d05f422b3a82137f5/dblp","date":"2008-11-04","description":"dblp","ee":"http://dx.doi.org/10.1109/TR.2008.916872","id":"journals/tr/AlhazmiM08","interhash":"dda79c5a60308e25a9a2430c05183ecb","intrahash":"2693bc4281279c2d05f422b3a82137f5","journal":"IEEE Transactions on Reliability","key":"journals/tr/AlhazmiM08","keywords":"dblp","number":"1","pages":"14-22","title":"Application of Vulnerability Discovery Models to Major Operating Systems.","type":"article","url":"http://dblp.uni-trier.de/db/journals/tr/tr57.html#AlhazmiM08","volume":"57","year":"2008","bibbaseid":"alhazmi-malaiya-applicationofvulnerabilitydiscoverymodelstomajoroperatingsystems-2008","role":"author","urls":{"Link":"http://dx.doi.org/10.1109/TR.2008.916872","Paper":"http://dblp.uni-trier.de/db/journals/tr/tr57.html#AlhazmiM08"},"keyword":["dblp"],"downloads":0},"search_terms":["application","vulnerability","discovery","models","major","operating","systems","alhazmi","malaiya"],"keywords":["dblp"],"authorIDs":[],"dataSources":["HrSTN87bbtZrxhw8F"]}