메뉴 건너뛰기




Volumn , Issue , 2008, Pages 917-918

Failure-prone components are also attack-prone components

Author keywords

Attack prone component

Indexed keywords

COMPUTER SYSTEMS PROGRAMMING; LINGUISTICS; MILITARY ENGINEERING; REGRESSION ANALYSIS;

EID: 63349084818     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1449814.1449907     Document Type: Conference Paper
Times cited : (6)

References (6)
  • 1
    • 34248348339 scopus 로고    scopus 로고
    • Measuring, analyzing and predicting vulnerabilities in software systems
    • May
    • O. H. Alhazmi, Y. K. Malaiya, and I. Ray, "Measuring, analyzing and predicting vulnerabilities in software systems," Computers & Security, vol. 26, no. 3, pp. 219-228, May 2006.
    • (2006) Computers & Security , vol.26 , Issue.3 , pp. 219-228
    • Alhazmi, O.H.1    Malaiya, Y.K.2    Ray, I.3
  • 3
    • 63349092403 scopus 로고    scopus 로고
    • M. Gegick, L. Williams, and M. Vouk, Predictive Models for Identifying Software Components Prone to Failure During Security Attacks, NC State University, Raleigh, TR-2008-07 25 February 2008.
    • M. Gegick, L. Williams, and M. Vouk, "Predictive Models for Identifying Software Components Prone to Failure During Security Attacks," NC State University, Raleigh, TR-2008-07 25 February 2008.
  • 5
    • 63349097118 scopus 로고    scopus 로고
    • A Discrete Lognormal Model for Software Defects Affecting QoP
    • Milan, Italy, 15 September
    • R. Mullen and S. Gokhale, "A Discrete Lognormal Model for Software Defects Affecting QoP," Proc of the Quality of Protection, Milan, Italy, 15 September 2005.
    • (2005) Proc of the Quality of Protection
    • Mullen, R.1    Gokhale, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.