slightly more topic drift w/respect to potential/possible threat models ...

i have put quite a bit of work into security taxonomy as part of the merged securitity glossary and taxonomy

i've relatively recently taken a pass at the cve database ...

but what I found was very little structure. i have done word frequency analysis on the descriptions ... but even that isn't really conclusive (since effectvely random people are generating quite random word descriptions). I was hoping to find more structure for expanding taxonomy for threat models, vulnerabilities, and exploits.

Anne & Lynn Wheeler

The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to