Cited By
View all- Gal‐Or EHydari MTelang R(2024)Merchants of Vulnerabilities: How Bug Bounty Programs Benefit Software VendorsSSRN Electronic Journal10.2139/ssrn.4808742Online publication date: 2024
- Mazloomzadeh IUddin GKhomh FSami A(2024)Reputation Gaming in Crowd Technical Knowledge SharingACM Transactions on Software Engineering and Methodology10.1145/369162734:1(1-41)Online publication date: 4-Sep-2024
- Sparks HGhosh K(2024)Discovery of Evolving Relationships of Software Vulnerabilities2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)10.1109/TPS-ISA62245.2024.00045(332-340)Online publication date: 28-Oct-2024
- Show More Cited By