Crowdsourced Security Vulnerability Discovery: Modeling and Organizing Bug-Bounty Programs
[18] Mingyi Zhao, Aron Laszka, Thomas Maillart, Jens Grossklags

Citation
[18] Mingyi Zhao, Aron Laszka, Thomas Maillart, Jens Grossklags. "Crowdsourced Security Vulnerability Discovery: Modeling and Organizing Bug-Bounty Programs". HCOMP Workshop on Mathematical Foundations of Human Computation, November, 2016.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    [18]	Mingyi Zhao, Aron Laszka, Thomas Maillart, Jens
    Grossklags. <a
    href="http://www.cps-forces.org/pubs/249.html"
    >Crowdsourced Security Vulnerability Discovery: Modeling
    and Organizing Bug-Bounty Programs</a>, HCOMP Workshop
    on Mathematical Foundations of Human Computation, November,
    2016.
  • Plain text
    [18]	Mingyi Zhao, Aron Laszka, Thomas Maillart, Jens
    Grossklags. "Crowdsourced Security Vulnerability
    Discovery: Modeling and Organizing Bug-Bounty
    Programs". HCOMP Workshop on Mathematical Foundations
    of Human Computation, November, 2016.
  • BibTeX
    @inproceedings{ZhaoLaszkaMaillartGrossklags16_CrowdsourcedSecurityVulnerabilityDiscoveryModelingOrganizing,
        author = {[18]	Mingyi Zhao and Aron Laszka and Thomas
                  Maillart and Jens Grossklags},
        title = {Crowdsourced Security Vulnerability Discovery:
                  Modeling and Organizing Bug-Bounty Programs},
        booktitle = {HCOMP Workshop on Mathematical Foundations of
                  Human Computation},
        month = {November},
        year = {2016},
        abstract = {(No abstract.)},
        URL = {http://cps-forces.org/pubs/249.html}
    }
    

Posted by Waseem Abbas on 2 Mar 2017.
Groups: forces
For additional information, see the Publications FAQ or contact webmaster at cps-forces org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.