This record contains the study datasets, descriptive results and questionnaires from the paper "Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities" by Julia Wunder, Andreas Kurtz, Christian Eichenmüller, Freya Gassmann and Zinaida Benenson to appear in Proceedings of the 45th IEEE Symposium on Security and Privacy (2024). The pseudonymous datasets contain data from the online surveys (main study with 196 participants and follow-up study with 59 participants). The first row gives the question codes and questions, the following rows gives the answers from the participants (see also README.md). We also provide descriptive results from the online surveys as PDF and the questi...
\u3cp\u3e(U.S.) Rule-based policies for mitigating software risk suggest using the CVSS score to mea...
Data Study Groups are week-long events at The Alan Turing Institute bringing together some of the co...
This record contains the lab study dataset and evaluation R source code from the paper "FIDO2 the Re...
The dataset supports the publication "Data Sharing and Use in Cybersecurity Research" by I. Kouper a...
This empirical paper examines the time delays that occur between the publication of Common Vulnerabi...
There are various challenges with online data collection, from participant recruitment to ensuring t...
As common vulnerabilites and exposures are detected, they are also discussed in various social platf...
Abstract—(U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measur...
Part 2: Human Aspects of SecurityInternational audienceCVSS Base Score and the underlying metrics ha...
There are various challenges with online data collection, from participant recruitment to ensuring ...
This repository contains supplementary materials for the following conference paper: V. Švábenský, ...
This dataset is used in a study entitled: Measuring Vulnerabilities in a Business Process Model. In ...
This study consists of two measures. In July 2008, the LISS panel was presented a questionnaire on h...
Vulnerability studies usually rely on the NVD or ‘proof-of-concept’ exploits databases (Exploit-db, ...
Paper available: https://petsymposium.org/popets/2022/popets-2022-0126.pdfProvided are the survey da...
\u3cp\u3e(U.S.) Rule-based policies for mitigating software risk suggest using the CVSS score to mea...
Data Study Groups are week-long events at The Alan Turing Institute bringing together some of the co...
This record contains the lab study dataset and evaluation R source code from the paper "FIDO2 the Re...
The dataset supports the publication "Data Sharing and Use in Cybersecurity Research" by I. Kouper a...
This empirical paper examines the time delays that occur between the publication of Common Vulnerabi...
There are various challenges with online data collection, from participant recruitment to ensuring t...
As common vulnerabilites and exposures are detected, they are also discussed in various social platf...
Abstract—(U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measur...
Part 2: Human Aspects of SecurityInternational audienceCVSS Base Score and the underlying metrics ha...
There are various challenges with online data collection, from participant recruitment to ensuring ...
This repository contains supplementary materials for the following conference paper: V. Švábenský, ...
This dataset is used in a study entitled: Measuring Vulnerabilities in a Business Process Model. In ...
This study consists of two measures. In July 2008, the LISS panel was presented a questionnaire on h...
Vulnerability studies usually rely on the NVD or ‘proof-of-concept’ exploits databases (Exploit-db, ...
Paper available: https://petsymposium.org/popets/2022/popets-2022-0126.pdfProvided are the survey da...
\u3cp\u3e(U.S.) Rule-based policies for mitigating software risk suggest using the CVSS score to mea...
Data Study Groups are week-long events at The Alan Turing Institute bringing together some of the co...
This record contains the lab study dataset and evaluation R source code from the paper "FIDO2 the Re...