Robert A. Martin
Titre
Citée par
Citée par
Année
Vulnerability type distributions in CVE
S Christey, RA Martin
Mitre report, May, 2007
2002007
The Industrial Internet of Things Volume G1 : Reference Architecture
SW Lin, B Miller, J Durand, G Bleakley, A Chigani, R Martin, B Murphy, ...
1852017
Managing vulnerabilities in networked systems
RA Martin
Computer 34 (11), 32-38, 2001
1302001
Industrial internet reference architecture
SW Lin, B Miller, J Durand, R Joshi, P Didier, A Chigani, R Torenbeek, ...
Industrial Internet Consortium (IIC), Tech. Rep, 2015
862015
Making security measurable and manageable
RA Martin
MILCOM 2008-2008 IEEE Military Communications Conference, 1-9, 2008
762008
Cybex: The cybersecurity information exchange framework (x. 1500)
A Rutkowski, Y Kadobayashi, I Furey, D Rajnovic, R Martin, T Takahashi, ...
ACM SIGCOMM Computer Communication Review 40 (5), 59-64, 2010
682010
Industrial Internet of Things Volume G4 : Security Framework
S Schrecker, H Soroush, J Molina, JP LeBlanc, F Hirsch, M Buchheit, ...
Industrial Internet Consortium, 2016
562016
Common weakness enumeration (cwe) status update
RA Martin, S Barnum
ACM SIGAda Ada Letters 28 (1), 88-91, 2008
40*2008
Dealing with dates: Solutions for the year 2000
RA Martin
Computer 30 (3), 44-51, 1997
391997
The evolution path for industrial software quality evaluation methods applying ISO/IEC 9126: 2001 quality model: example of MITRE’s SQAE method
MA Côté, W Suryn, CY Laporte, RA Martin
Software Quality Journal 13 (1), 17-30, 2005
332005
Malware attribute enumeration and characterization
I Kirillov, D Beck, P Chase, R Martin
The MITRE Corporation [online, accessed Apr. 8, 2019], 2011
282011
The case for common flaw enumeration
RA Martin, SM Christey, J Jarzombek
Proceedings of Workshop on Software Security Assurance Tools, Techniques …, 2005
262005
Evolving a corporate software quality assessment exercise: A migration path to ISO/IEC 9126
MA Cote, W Suryn, RA Martin, CY Laporte
Software Quality Professional 6 (3), 4, 2004
232004
Being explicit about security weaknesses
R Martin, S Barnum, S Christey
CrossTalk The Journal of Defense Software Engineering 20, 4-8, 2007
182007
Transformational vulnerability management through standards
RA Martin
132005
Integrating your information security vulnerability management capabilities through industry standards (CVE&OVAL)
RA Martin
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003
122003
The preliminary list of vulnerability examples for researchers (PLOVER)
SM Christey
NIST Workshop Defining the State of the Art of Software Security Tools …, 2005
92005
Providing a framework for effective software quality assessment
RA Martin, LH Shafer
The MITRE Corporation, 1996
91996
Managing vulnerabilities in your commercial-off-the-shelf (COTS) systems using an industry standards effort
RA Martin
Proceedings. The 21st Digital Avionics Systems Conference 1, 4A1-4A1, 2002
82002
The Vulnerabilities of Developing on the NET
RA Martin
Crosstalk, The Journal of Defense Software Engineering, 5-10, 2001
82001
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20