Robert A. Martin
Citée par
Citée par
Vulnerability type distributions in CVE
S Christey, RA Martin
Mitre report, May, 2007
The Industrial Internet of Things Volume G1 : Reference Architecture
SW Lin, B Miller, J Durand, G Bleakley, A Chigani, R Martin, B Murphy, ...
Managing vulnerabilities in networked systems
RA Martin
Computer 34 (11), 32-38, 2001
Industrial internet reference architecture
SW Lin, B Miller, J Durand, R Joshi, P Didier, A Chigani, R Torenbeek, ...
Industrial Internet Consortium (IIC), Tech. Rep, 2015
Making security measurable and manageable
RA Martin
MILCOM 2008-2008 IEEE Military Communications Conference, 1-9, 2008
Cybex: The cybersecurity information exchange framework (x. 1500)
A Rutkowski, Y Kadobayashi, I Furey, D Rajnovic, R Martin, T Takahashi, ...
ACM SIGCOMM Computer Communication Review 40 (5), 59-64, 2010
Industrial Internet of Things Volume G4 : Security Framework
S Schrecker, H Soroush, J Molina, JP LeBlanc, F Hirsch, M Buchheit, ...
Industrial Internet Consortium, 2016
Common weakness enumeration (cwe) status update
RA Martin, S Barnum
ACM SIGAda Ada Letters 28 (1), 88-91, 2008
Dealing with dates: Solutions for the year 2000
RA Martin
Computer 30 (3), 44-51, 1997
The evolution path for industrial software quality evaluation methods applying ISO/IEC 9126: 2001 quality model: example of MITRE’s SQAE method
MA Côté, W Suryn, CY Laporte, RA Martin
Software Quality Journal 13 (1), 17-30, 2005
Malware attribute enumeration and characterization
I Kirillov, D Beck, P Chase, R Martin
The MITRE Corporation [online, accessed Apr. 8, 2019], 2011
The case for common flaw enumeration
RA Martin, SM Christey, J Jarzombek
Proceedings of Workshop on Software Security Assurance Tools, Techniques …, 2005
Evolving a corporate software quality assessment exercise: A migration path to ISO/IEC 9126
MA Cote, W Suryn, RA Martin, CY Laporte
Software Quality Professional 6 (3), 4, 2004
Being explicit about security weaknesses
R Martin, S Barnum, S Christey
CrossTalk The Journal of Defense Software Engineering 20, 4-8, 2007
Transformational vulnerability management through standards
RA Martin
Integrating your information security vulnerability management capabilities through industry standards (CVE&OVAL)
RA Martin
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003
The preliminary list of vulnerability examples for researchers (PLOVER)
SM Christey
NIST Workshop Defining the State of the Art of Software Security Tools …, 2005
Providing a framework for effective software quality assessment
RA Martin, LH Shafer
The MITRE Corporation, 1996
Managing vulnerabilities in your commercial-off-the-shelf (COTS) systems using an industry standards effort
RA Martin
Proceedings. The 21st Digital Avionics Systems Conference 1, 4A1-4A1, 2002
The Vulnerabilities of Developing on the NET
RA Martin
Crosstalk, The Journal of Defense Software Engineering, 5-10, 2001
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20