메뉴 건너뛰기




Volumn , Issue , 2008, Pages 315-316

Ranking attack-prone components with a predictive model

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION AND REGRESSION TREE; LINES OF CODE; PREDICTIVE MODELS; PROBABILITY OF ATTACK; RISK COMPONENTS; SECURITY RISK ANALYSIS; SECURITY TESTING; SOFTWARE COMPONENT; SOFTWARE ENGINEERS; SOFTWARE SYSTEMS;

EID: 67249159318     PISSN: 10719458     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSRE.2008.24     Document Type: Conference Paper
Times cited : (6)

References (4)
  • 1
    • 85008047921 scopus 로고    scopus 로고
    • Software defect reduction top 10 list
    • January
    • B. Boehm and V. Basili, "Software Defect Reduction Top 10 List," IEEE Computer, vol.34, no. 1, pp. 135-137, January, 2001.
    • (2001) IEEE Computer , vol.34 , Issue.1 , pp. 135-137
    • Boehm, B.1    Basili, V.2
  • 2
    • 67249166010 scopus 로고    scopus 로고
    • Prioritizing software security fortification through code-level security metrics
    • to appear, Alexandria, VA
    • M. Gegick, L. Williams, J. Osborne, and M. Vouk, "Prioritizing Software Security Fortification through Code- Level Security Metrics," Workshop on Quality of Protection to appear, Alexandria, VA, 2008.
    • (2008) Workshop on Quality of Protection
    • Gegick, M.1    Williams, L.2    Osborne, J.3    Vouk, M.4
  • 4
    • 77954507799 scopus 로고    scopus 로고
    • Is complexity really the enemy of software security?
    • to appear, Alexandria, VA
    • Y. Shin and L. Williams, "Is Complexity Really the Enemy of Software Security?," Workshop on Quality of Protection to appear, Alexandria, VA, 2008.
    • (2008) Workshop on Quality of Protection
    • Shin, Y.1    Williams, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.