-
2
-
-
0035400435
-
Maintenance and testing effort modeled by linear and nonlinear dynamic systems
-
F. Calzolari, P. Tonella, and G. Antoniol. Maintenance and testing effort modeled by linear and nonlinear dynamic systems. Information & Software Technology, 43(8):477-486, 2001.
-
(2001)
Information & Software Technology
, vol.43
, Issue.8
, pp. 477-486
-
-
Calzolari, F.1
Tonella, P.2
Antoniol, G.3
-
5
-
-
77956610962
-
Characterizing the 'security vulnerability likelihood' of software functions
-
Washington, DC, USA, IEEE Computer Society
-
D. DaCosta, C. Dahn, S. Mancoridis, and V. Prevelakis. Characterizing the 'security vulnerability likelihood' of software functions. In ICSM'03: Proceedings of the International Conference on Software Maintenance, page 266, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
ICSM'03: Proceedings of the International Conference on Software Maintenance
, pp. 266
-
-
DaCosta, D.1
Dahn, C.2
Mancoridis, S.3
Prevelakis, V.4
-
6
-
-
84944558150
-
Using program transformation to secure C programs against buffer overflows
-
Washington, DC, USA, IEEE Computer Society
-
C. Dahn and S. Mancoridis. Using program transformation to secure C programs against buffer overflows. In WCRE'03: Proceedings of the 10th Working Conference on Reverse Engineering, page 323, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
WCRE'03: Proceedings of the 10th Working Conference on Reverse Engineering
, pp. 323
-
-
Dahn, C.1
Mancoridis, S.2
-
7
-
-
32444432284
-
Improving network applications security: A new heuristic to generate stress testing data
-
New York, NY, USA, ACM
-
C. Del Grosso, G. Antoniol, M. Di Penta, P. Galinier, and E. Merlo. Improving network applications security: a new heuristic to generate stress testing data. In GECCO'05: Proceedings of the 2005 conference on Genetic and evolutionary computation, pages 1037-1043, New York, NY, USA, 2005. ACM.
-
(2005)
GECCO'05: Proceedings of the 2005 conference on Genetic and evolutionary computation
, pp. 1037-1043
-
-
Del Grosso, C.1
Antoniol, G.2
Di Penta, M.3
Galinier, P.4
Merlo, E.5
-
8
-
-
56349087678
-
An empirical study on the evolution of vulnerable code
-
Technical report, Dept. of Engineering, Univ. of Sannio, Italy
-
M. Di Penta, L. Cerulo, and L. Aversano. An empirical study on the evolution of vulnerable code. Technical report, Dept. of Engineering, Univ. of Sannio, Italy, 2008. http://www.rcost.unisannio.it/vuln-tr.pdf.
-
(2008)
-
-
Di Penta, M.1
Cerulo, L.2
Aversano, L.3
-
9
-
-
0000472488
-
Likelihood ratio statistics for autoregressive time series with a unit root
-
June
-
D. A. Dickey and W. A. Fuller. Likelihood ratio statistics for autoregressive time series with a unit root. Econometrica, 49(4):1057-72, June 1981.
-
(1981)
Econometrica
, vol.49
, Issue.4
, pp. 1057-1072
-
-
Dickey, D.A.1
Fuller, W.A.2
-
11
-
-
84880450431
-
Web application security assessment by fault injection and behavior monitoring
-
New York, NY, USA, ACM
-
Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai. Web application security assessment by fault injection and behavior monitoring. In WWW'03: Proceedings of the I2th international conference on World Wide Web, pages 148-159, New York, NY, USA, 2003. ACM.
-
(2003)
WWW'03: Proceedings of the I2th international conference on World Wide Web
, pp. 148-159
-
-
Huang, Y.-W.1
Huang, S.-K.2
Lin, T.-P.3
Tsai, C.-H.4
-
13
-
-
37849006243
-
Which warnings should i fix first?
-
Dubrovnik, Croatia, September 3-7
-
S. Kim and M. D. Ernst. Which warnings should i fix first? In Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007, pages 45-54, 2007.
-
(2007)
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007
, pp. 45-54
-
-
Kim, S.1
Ernst, M.D.2
-
14
-
-
0029492449
-
Assertion-oriented automated test data generation
-
Washington, DC, USA, IEEE CS
-
B. Korel and A. M. Al-Yami. Assertion-oriented automated test data generation. In ICSE'96: Proceedings of the 18th international conference on Software engineering, pages 71-80, Washington, DC, USA, 1996. IEEE CS.
-
(1996)
ICSE'96: Proceedings of the 18th international conference on Software engineering
, pp. 71-80
-
-
Korel, B.1
Al-Yami, A.M.2
-
15
-
-
56349122926
-
-
I. V. Krsul. Software vulnerability analysis. PhD thesis, West Lafayette, IN, USA, 1998. Major Professor-Eugene H. Spafford.
-
I. V. Krsul. Software vulnerability analysis. PhD thesis, West Lafayette, IN, USA, 1998. Major Professor-Eugene H. Spafford.
-
-
-
-
16
-
-
20344369580
-
Empirical evaluation of defect projection models for widely-deployed production software systems
-
New York, NY, USA, ACM
-
P. L. Li, M. Shaw, J. Herbsleb, B. Ray, and P. Santhanam. Empirical evaluation of defect projection models for widely-deployed production software systems. In SIG-SOFT'04/FSE-12: Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering, pages 263-272, New York, NY, USA, 2004. ACM.
-
(2004)
SIG-SOFT'04/FSE-12: Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
, pp. 263-272
-
-
Li, P.L.1
Shaw, M.2
Herbsleb, J.3
Ray, B.4
Santhanam, P.5
-
17
-
-
34547655711
-
Automated protection of php applications against SQL-injection attacks
-
Washington, DC, USA, IEEE Computer Society
-
E. Merlo, D. Letarte, and G. Antoniol. Automated protection of php applications against SQL-injection attacks. In CSMR'07: Proceedings of the 11th European Conference on Software Maintenance and Reengineering, pages 191-202, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
CSMR'07: Proceedings of the 11th European Conference on Software Maintenance and Reengineering
, pp. 191-202
-
-
Merlo, E.1
Letarte, D.2
Antoniol, G.3
-
19
-
-
0037587474
-
Understanding and predicting effort in software projects
-
Washington, DC, USA, IEEE CS
-
A. Mockus, D. M. Weiss, and P. Zhang. Understanding and predicting effort in software projects. In ICSE'03: Proceedings of the 25th International Conference on Software Engineering, pages 274-284, Washington, DC, USA, 2003. IEEE CS.
-
(2003)
ICSE'03: Proceedings of the 25th International Conference on Software Engineering
, pp. 274-284
-
-
Mockus, A.1
Weiss, D.M.2
Zhang, P.3
-
20
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
O. Ruwase and M.S. Lam. A practical dynamic buffer overflow detector. In NDSS, 2004.
-
(2004)
NDSS
-
-
Ruwase, O.1
Lam, M.S.2
-
21
-
-
77953069969
-
Abstracting application-level web security
-
New York, NY, USA, ACM
-
D. Scott and R. Sharp. Abstracting application-level web security. In WWW'02: Proceedings of the 11th international conference on World Wide Web, pages 396-407, New York, NY, USA, 2002. ACM.
-
(2002)
WWW'02: Proceedings of the 11th international conference on World Wide Web
, pp. 396-407
-
-
Scott, D.1
Sharp, R.2
-
22
-
-
0033880192
-
Automated test-data generation for exception conditions
-
N. Tracey, J. Clark, K. Mander, and J. McDermid. Automated test-data generation for exception conditions. Softw. Pract. Exper., 30(1):61-79, 2000.
-
(2000)
Softw. Pract. Exper
, vol.30
, Issue.1
, pp. 61-79
-
-
Tracey, N.1
Clark, J.2
Mander, K.3
McDermid, J.4
-
23
-
-
33846246751
-
Enhancing security using legality assertions
-
Washington, DC, USA, IEEE CS
-
L. Wang, J. R. Cordy, and T. R. Dean. Enhancing security using legality assertions. In WCRE'05: Proceedings of the 12th Working Conference on Reverse Engineering, pages 35-44, Washington, DC, USA, 2005. IEEE CS.
-
(2005)
WCRE'05: Proceedings of the 12th Working Conference on Reverse Engineering
, pp. 35-44
-
-
Wang, L.1
Cordy, J.R.2
Dean, T.R.3
-
24
-
-
0003639957
-
-
Kluwer Academic Publishers
-
C. Wohlin, P. Runeson, M. Höst, M. Ohlsson, B. Regnell, and A. Wesslén. Experimentation in Software Engineering - An Introduction. Kluwer Academic Publishers, 2000.
-
(2000)
Experimentation in Software Engineering - An Introduction
-
-
Wohlin, C.1
Runeson, P.2
Höst, M.3
Ohlsson, M.4
Regnell, B.5
Wesslén, A.6
-
25
-
-
42549101143
-
Predicting software reliability
-
A. Wood. Predicting software reliability. IEEE Computer, 9:69-77, 1999.
-
(1999)
IEEE Computer
, vol.9
, pp. 69-77
-
-
Wood, A.1
-
27
-
-
4544295325
-
Mining version histories to guide software changes
-
IEEE CS
-
T. Zimmermann, P. Weisgerber, S. Diehl, and A. Zeller. Mining version histories to guide software changes. In ICSE'04: Proceedings of the 26th International Conference on Software Engineering, pages 563-572. IEEE CS, 2004.
-
(2004)
ICSE'04: Proceedings of the 26th International Conference on Software Engineering
, pp. 563-572
-
-
Zimmermann, T.1
Weisgerber, P.2
Diehl, S.3
Zeller, A.4
|