메뉴 건너뛰기




Volumn , Issue , 2009, Pages 181-190

Predicting attack-prone components

Author keywords

[No Author keywords available]

Indexed keywords

DATA SETS; END USERS; FALSE POSITIVE RATES; GOODNESS OF FIT; INPUT VARIABLES; MANUAL INSPECTION; PREDICTING ATTACKS; PREDICTIVE MODELS; RECEIVER OPERATING CHARACTERISTIC CURVES; SECURITY RISKS; SOFTWARE COMPONENT; SOFTWARE ENGINEERS; SOFTWARE LIFE CYCLES; SOFTWARE SYSTEMS; SYSTEM COMPONENTS;

EID: 67650114105     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICST.2009.36     Document Type: Conference Paper
Times cited : (28)

References (33)
  • 1
    • 34248348339 scopus 로고    scopus 로고
    • Measuring, analyzing and predicting vulnerabilities in software systems
    • O. H. Alhazmi, Y. K. Malaiya, and I. Ray, "Measuring, analyzing and predicting vulnerabilities in software systems," Computers & Security, vol. 26, no. 3, pp. 219-228, May 2006.
    • (2006) Computers & Security , vol.26 , Issue.3 , pp. 219-228
    • Alhazmi, O.H.1    Malaiya, Y.K.2    Ray, I.3
  • 3
    • 85008047921 scopus 로고    scopus 로고
    • Software defect reduction top 10 list
    • January
    • B. Boehm and V. Basili, "Software Defect Reduction Top 10 List," IEEE Computer, vol. 34, no. 1, pp. 135-137, January, 2001.
    • (2001) IEEE Computer , vol.34 , Issue.1 , pp. 135-137
    • Boehm, B.1    Basili, V.2
  • 4
    • 33746592989 scopus 로고    scopus 로고
    • Putting the tools to work: How to succeed with source code analysis
    • DOI 10.1109/MSP.2006.77, 1637389
    • P. Chandra, B. Chess, and J. Steven, "Putting the Tools to Work: How to Succeed with Source Code Analysis," IEEE Security & Privacy, vol. 4, no. 3, pp. 80-83, May/June, 2006. (Pubitemid 44144084)
    • (2006) IEEE Security and Privacy , vol.4 , Issue.3 , pp. 80-83
    • Chandra, P.1    Chess, B.2
  • 10
    • 67249159318 scopus 로고    scopus 로고
    • Student Paper: Ranking attack-prone components with a predictive model
    • November
    • M. Gegick and L. Williams, "STUDENT PAPER: Ranking Attack-prone Components with a Predictive Model," ISSRE, Redmond, WA, pp. 315-316, November 2008.
    • (2008) ISSRE, Redmond, WA , pp. 315-316
    • Gegick, M.1    Williams, L.2
  • 11
    • 70349244714 scopus 로고    scopus 로고
    • Prioritizing software security fortification through code-level security metrics
    • Alexandria, VA, October
    • M. Gegick, L. Williams, J. Osborne, and M. Vouk, "Prioritizing Software Security Fortification through Code-Level Security Metrics," Workshop on Quality of Protection, Alexandria, VA, pp. 31-37, October 2008.
    • (2008) Workshop on Quality of Protection , pp. 31-37
    • Gegick, M.1    Williams, L.2    Osborne, J.3    Vouk, M.4
  • 13
    • 77954505222 scopus 로고    scopus 로고
    • Toward nonsecurity failures as a predictor of security faults and failures
    • Leuven, Belgium, February 4-6
    • M. Gegick, P. Rotella, and L. Williams, "Toward Nonsecurity Failures as a Predictor of Security Faults and Failures," ESSoS, Leuven, Belgium, February 4-6 2009.
    • (2009) ESSoS
    • Gegick, M.1    Rotella, P.2    Williams, L.3
  • 18
    • 67249086374 scopus 로고    scopus 로고
    • Cost curve evaluation of fault prediction models
    • Redmond, WA, 11-14 November
    • Y. Jiang, B. Cukic, and T. Menzies, "Cost Curve Evaluation of Fault Prediction Models," ISSRE, Redmond, WA, 11-14 November 2008.
    • (2008) ISSRE
    • Jiang, Y.1    Cukic, B.2    Menzies, T.3
  • 19
    • 0036891333 scopus 로고    scopus 로고
    • Using regression trees to classify fault-prone software modules
    • December
    • T. M. Khoshgoftaar, E. B. Allen, and J. Deng, "Using Regression Trees to Classify Fault-Prone Software Modules," IEEE Transactions on Reliability, vol. 51, no. 4, pp. 455-562, December 2002.
    • (2002) IEEE Transactions on Reliability , vol.51 , Issue.4 , pp. 455-562
    • Khoshgoftaar, T.M.1    Allen, E.B.2    Deng, J.3
  • 24
    • 33244495065 scopus 로고    scopus 로고
    • Static analysis tools as early indicators of pre-release defect density
    • St. Louis, MO
    • N. Nagappan and T. Ball, "Static Analysis Tools as Early Indicators of Pre-release Defect Density," ICSE, St. Louis, MO, pp. 580-586, 2005.
    • (2005) ICSE , pp. 580-586
    • Nagappan, N.1    Ball, T.2
  • 25
    • 33244463047 scopus 로고    scopus 로고
    • Use of relative code churn measures to predict defect density
    • St. Louis, MO, 15-21 May
    • N. Nagappan and T. Ball, "Use of Relative Code Churn Measures to Predict Defect Density," ICSE, St. Louis, MO, pp. 284-292, 15-21 May 2005.
    • (2005) ICSE , pp. 284-292
    • Nagappan, N.1    Ball, T.2
  • 26
    • 67249126825 scopus 로고    scopus 로고
    • Predicting vulnerable software components
    • Alexandria, VA, 29 October-2 November
    • S. Neuhaus, T. Zimmermann, C. Holler, and A. Zeller, "Predicting Vulnerable Software Components," CCS, Alexandria, VA, pp. 529-540, 29 October-2 November 2007.
    • (2007) CCS , pp. 529-540
    • Neuhaus, S.1    Zimmermann, T.2    Holler, C.3    Zeller, A.4
  • 29
    • 67650202726 scopus 로고    scopus 로고
    • SAS Institute Inc.
    • SAS Institute, Inc., Cary, NC
    • SAS Institute Inc., "The Partition Platform," SAS Institute, Inc., Cary, NC, 2003.
    • (2003) The Partition Platform
  • 30
    • 3543121509 scopus 로고
    • Some issues in multi-phase software reliability modeling
    • Toronto, October
    • M. Vouk and K. C. Tai, "Some Issues in Multi-Phase Software Reliability Modeling," CASCON, Toronto, pp. 512-523, October 1993.
    • (1993) CASCON , pp. 512-523
    • Vouk, M.1    Tai, K.C.2
  • 32
    • 0024664438 scopus 로고
    • Rethinking the taxonomy of fault detection techniques
    • M. Young and R. N. Taylor, "Rethinking the Taxonomy of Fault Detection Techniques," ICSE, pp. 53-62, 1989.
    • (1989) ICSE , pp. 53-62
    • Young, M.1    Taylor, R.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.