Details Details PDF BIBTEX RIS Title Trust and Risk Assessment Model of Popular Software Based on Known Vulnerabilities Journal title International Journal of Electronics and Telecommunications Yearbook 2017 Volume vol. 63 Issue No 3 Authors Janiszewski, Marek ; Felkner, Anna ; Olszak, Jakub Divisions of PAS Nauki Techniczne Publisher Polish Academy of Sciences Committee of Electronics and Telecommunications Date 2017 Identifier DOI: 10.1515/eletel-2017-0044 ; eISSN 2300-1933 (since 2013) ; ISSN 2081-8491 (until 2012) Source International Journal of Electronics and Telecommunications; 2017; vol. 63; No 3 References Sans (2017), http isc sans edu diary access date, null, 20, 02. ; (2017), The Incident Response Center Luxembourg http cve circl lu - access date, Computer, 14, 02. ; (2017), Vulnerability lab http www vulnerability lab com access date, null, 21, 02. ; Vulners (2017), com https vulners com access date, null, 22, 02. ; Symantec (2017), http www symantec com securityresponse landing vulnerabilities jsp access date, null, 02. ; (2017), Exploit db http www exploit db com access date, null, 17, 02. ; Zhang (2011), An Emperical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities, null, 6860, doi.org/10.1007/978-3-642-23088-215 ; (2017), Tracker http www securitytracker com access date, Security, 12, 02. ; Fulldisclosure (2017), http seclists org fulldisclosure access date, null, 16, 02. ; (2016), Intelligent Exploit http www intelligentexploit com - access date currently not accessible, null, 18, 02. ; Vfeed (2017), https github com toolswatch vFeed access date, null, 23, 02. ; (2017), dcitionary https cpe mitre org access date, null, 24, 02. ; Felkner (2016), and analysis of sources of information about vulnerabilities telekomunikacyjny i wiadomoci telekomunikacyjne, Review, 8, 929, doi.org/10.15199/59.2016.8-9.37 ; (2017), US CERT vulnerability notes database http www kb cert org vuls - access date, null, 13, 02. ; Zhang (null), Predicting Cyber Risks through National Vulnerability Database Global Perspective, Information Security Journal, 1, doi.org/10.1080/19393555.2015.1111961 ; CVEdetails (2017), http www cvedetails com access date, null, 15, 02. ; Metasploit (2017), Rapid https www rapid com db access date, null, 19, 02. ; Ozment (2007), Vulnerability Discovery Software thesis University of, Security. ; Dragonsoft (2016), vulnerability database http vdb dragonsoft com - access date currently not accessible, null, 02. ; SecurityFocus (2017), http www securityfocus com vulnerabilities access date, null, 11, 02. ; Ingols (2009), Modeling modern network attacks and countermeasures using attack graphs, Annual Computer Security Conference, doi.org/10.1109/ACSAC.2009.21