Bug bounty program (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Bug bounty program" in English language version.

refsWebsite
Global rank English rank
274th place
309th place
2,921st place
2,118th place
2nd place
2nd place
69th place
59th place
11th place
8th place
272nd place
225th place
low place
low place
388th place
265th place
1,185th place
840th place
102nd place
76th place
5th place
5th place
193rd place
152nd place
1st place
1st place
low place
low place
28th place
26th place
758th place
500th place
low place
low place
786th place
558th place
low place
low place
low place
low place
low place
low place
114th place
90th place
163rd place
185th place
low place
low place
616th place
430th place
1,038th place
668th place
68th place
117th place
low place
low place

acm.org

dl.acm.org

  • Ding, Aaron Yi; De Jesus, Gianluca Limon; Janssen, Marijn (2019). "Ethical hacking for boosting IoT vulnerability management". Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing. Ictrs '19. Rhodes, Greece: ACM Press. pp. 49–55. arXiv:1909.11166. doi:10.1145/3357767.3357774. ISBN 978-1-4503-7669-3. S2CID 202676146.

arstechnica.com

arxiv.org

  • Ding, Aaron Yi; De Jesus, Gianluca Limon; Janssen, Marijn (2019). "Ethical hacking for boosting IoT vulnerability management". Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing. Ictrs '19. Rhodes, Greece: ACM Press. pp. 49–55. arXiv:1909.11166. doi:10.1145/3357767.3357774. ISBN 978-1-4503-7669-3. S2CID 202676146.
  • Maillart, Thomas; Zhao, Mingyi; Grossklags, Jens; Chuang, John (2017). "Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs". Journal of Cybersecurity. 3 (2): 81–90. arXiv:1608.03445. doi:10.1093/cybsec/tyx008.

cnet.com

cnn.com

edition.cnn.com

cobalt.io

blog.cobalt.io

csoonline.com

defense.gov

digitalbond.com

doi.org

  • Ding, Aaron Yi; De Jesus, Gianluca Limon; Janssen, Marijn (2019). "Ethical hacking for boosting IoT vulnerability management". Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing. Ictrs '19. Rhodes, Greece: ACM Press. pp. 49–55. arXiv:1909.11166. doi:10.1145/3357767.3357774. ISBN 978-1-4503-7669-3. S2CID 202676146.
  • Weulen Kranenbarg, Marleen; Holt, Thomas J.; van der Ham, Jeroen (November 19, 2018). "Don't shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure". Crime Science. 7 (1): 16. doi:10.1186/s40163-018-0090-8. hdl:1871.1/8cdcfab0-9864-46c2-a7b7-a295c8ee511a. ISSN 2193-7680. S2CID 54080134.
  • Maillart, Thomas; Zhao, Mingyi; Grossklags, Jens; Chuang, John (2017). "Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs". Journal of Cybersecurity. 3 (2): 81–90. arXiv:1608.03445. doi:10.1093/cybsec/tyx008.

europa.eu

joinup.ec.europa.eu

google.com

googleonlinesecurity.blogspot.com

handle.net

hdl.handle.net

infosecwriteups.com

proprivacy.com

rand.org

securityweek.com

semanticscholar.org

api.semanticscholar.org

  • Ding, Aaron Yi; De Jesus, Gianluca Limon; Janssen, Marijn (2019). "Ethical hacking for boosting IoT vulnerability management". Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing. Ictrs '19. Rhodes, Greece: ACM Press. pp. 49–55. arXiv:1909.11166. doi:10.1145/3357767.3357774. ISBN 978-1-4503-7669-3. S2CID 202676146.
  • Weulen Kranenbarg, Marleen; Holt, Thomas J.; van der Ham, Jeroen (November 19, 2018). "Don't shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure". Crime Science. 7 (1): 16. doi:10.1186/s40163-018-0090-8. hdl:1871.1/8cdcfab0-9864-46c2-a7b7-a295c8ee511a. ISSN 2193-7680. S2CID 54080134.

senate.gov

commerce.senate.gov

springer.com

link.springer.com

techworm.net

theverge.com

threatpost.com

venturebeat.com

web.archive.org

wired.com

worldcat.org

search.worldcat.org

zdnet.com