-
2
-
-
24944448110
-
One Evaluation of Model-Based Testing and its Automation
-
A. Pretschner, W. Prenninger, S.Wagner, C. K̈uhnel, M. Baumgartner, B. Sostawa, R. Z̈olch, and T, Stauner. "One Evaluation of Model-Based Testing and its Automation." In Proc. 27th International Conference on Software Engineering (ICSE'05), 2005.
-
(2005)
Proc. 27th International Conference on Software Engineering (ICSE'05)
-
-
Pretschner, A.1
Prenninger, W.2
Wagner, S.3
K̈uhnel, C.4
Baumgartner, M.5
Sostawa, B.6
Z̈olch, R.7
Stauner, T.8
-
4
-
-
0004311122
-
Lint, a C program checker
-
Bell Laboratories
-
S.C. Johnson., "Lint, a C program checker" Computer Science Tech. report 65, Bell Laboratories, 1978.
-
(1978)
Computer Science Tech. report
, vol.65
-
-
Johnson, S.C.1
-
6
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
D. Evans and D. Larochelle , "Improving security using extensible lightweight static analysis," IEEE Softw., vol. 19 (1) 42-51, 2002.
-
(2002)
IEEE Softw
, vol.19
, Issue.1
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
7
-
-
57349097438
-
-
J. Sehuh and D. Stampley, CODE SCANNERS: FALSE Sense of Security?, Network Computing, 18, 7, ABI/INFORM Globalpg. 45, 2007
-
J. Sehuh and D. Stampley, CODE SCANNERS: FALSE Sense of Security?, Network Computing, 18, 7, ABI/INFORM Globalpg. 45, 2007
-
-
-
-
8
-
-
57349149812
-
Software Security Analysis - Managing Source Code Audit
-
B. Carlsson., and D. Baca, "Software Security Analysis - Managing Source Code Audit", 31st EUROMICRO Conference, 2005.
-
(2005)
31st EUROMICRO Conference
-
-
Carlsson, B.1
Baca, D.2
-
9
-
-
79959555988
-
Effect of static analysis tools on software security: Preliminary investigation
-
V. Okun, W. F. Guthrie, R. Gaucher, P. E. Black, "Effect of static analysis tools on software security: preliminary investigation", Proceedings of Quality of Protection, p.1-5, 2007
-
(2007)
Proceedings of Quality of Protection
, pp. 1-5
-
-
Okun, V.1
Guthrie, W.F.2
Gaucher, R.3
Black, P.E.4
-
10
-
-
57349125419
-
Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors
-
presented at, Long Beach, CA
-
Tsipenyui, K., B. Chess, and G. McGraw, "Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors," presented at Automated Software Engineering, Long Beach, CA, 2005.
-
(2005)
Automated Software Engineering
-
-
Tsipenyui, K.1
Chess, B.2
McGraw, G.3
-
11
-
-
0019608720
-
Formal Models for Computer Security
-
C.E. Landwehr, "Formal Models for Computer Security," ACM Computing Surveys 13(3), 247-278 1981.
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
12
-
-
0036039794
-
A system and language for building system-specific, static analyses
-
June
-
S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language for building system-specific, static analyses. Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation, June 2002.
-
(2002)
Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation
-
-
Hallem, S.1
Chelf, B.2
Xie, Y.3
Engler, D.4
-
13
-
-
57349183302
-
-
Coverity Prevent manual
-
Coverity Prevent manual.
-
-
-
-
14
-
-
33646067113
-
Faults-Slip-Through A Concept of Measuring the Efficiency of the Test Process
-
Wiley InterScience
-
L. Damm, "Faults-Slip-Through A Concept of Measuring the Efficiency of the Test Process", Journal of Software Process: Improving and Practice, Wiley InterScience, 11(1), pp. 47-59, 2006.
-
(2006)
Journal of Software Process: Improving and Practice
, vol.11
, Issue.1
, pp. 47-59
-
-
Damm, L.1
-
15
-
-
85008047921
-
Software Defect Reduction Top 10 List
-
January
-
Boehm, B. and Basili, V. Software Defect Reduction Top 10 List, IEEE Computer, Vol. 34, No. 1, January 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.1
-
-
Boehm, B.1
Basili, V.2
-
16
-
-
0034205795
-
A Comprehensive Evaluation of Capture-Recapture Models for Estimating Software Defect content
-
Briand, L.C., Emam, K. El, Freimut, B.G., Laitenberger, O., A Comprehensive Evaluation of Capture-Recapture Models for Estimating Software Defect content. IEEE Transactions on Software Engineering, 26:6, 518-540, 2000.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, Issue.6
, pp. 518-540
-
-
Briand, L.C.1
Emam2
El, K.3
Freimut, B.G.4
Laitenberger, O.5
|