-
1
-
-
34248348339
-
Measuring, analyzing and predicting vulnerabilities in software systems
-
O. H. Alhazmi, Y. K. Malaiya, and I. Ray, "Measuring, analyzing and predicting vulnerabilities in software systems," Computers & Security, vol. 26, no. 3, pp. 219-228, May 2006.
-
(2006)
Computers & Security
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
Ray, I.3
-
3
-
-
85008047921
-
Software defect reduction top 10 list
-
January
-
B. Boehm and V. Basili, "Software Defect Reduction Top 10 List," IEEE Computer, vol. 34, no. 1, pp. 135-137, January, 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.1
, pp. 135-137
-
-
Boehm, B.1
Basili, V.2
-
4
-
-
33746592989
-
Putting the tools to work: How to succeed with source code analysis
-
DOI 10.1109/MSP.2006.77, 1637389
-
P. Chandra, B. Chess, and J. Steven, "Putting the Tools to Work: How to Succeed with Source Code Analysis," IEEE Security & Privacy, vol. 4, no. 3, pp. 80-83, May/June, 2006. (Pubitemid 44144084)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.3
, pp. 80-83
-
-
Chandra, P.1
Chess, B.2
-
8
-
-
7744220722
-
-
Cary, NC, SAS Institute, Inc.
-
R. Freund, R. Littell, and L. Creighton, Regression Using JMP, Cary, NC, SAS Institute, Inc., 2003.
-
(2003)
Regression Using JMP
-
-
Freund, R.1
Littell, R.2
Creighton, L.3
-
9
-
-
63349084818
-
Failure-prone components are also attackprone components
-
October
-
M. Gegick, "Failure-prone Components are also Attackprone Components," OOPSLA - ACM student research competition, Nashville, Tennessee, pp. 917-918, October 2008.
-
(2008)
OOPSLA - ACM student research competition, Nashville, Tennessee
, pp. 917-918
-
-
Gegick, M.1
-
10
-
-
67249159318
-
Student Paper: Ranking attack-prone components with a predictive model
-
November
-
M. Gegick and L. Williams, "STUDENT PAPER: Ranking Attack-prone Components with a Predictive Model," ISSRE, Redmond, WA, pp. 315-316, November 2008.
-
(2008)
ISSRE, Redmond, WA
, pp. 315-316
-
-
Gegick, M.1
Williams, L.2
-
11
-
-
70349244714
-
Prioritizing software security fortification through code-level security metrics
-
Alexandria, VA, October
-
M. Gegick, L. Williams, J. Osborne, and M. Vouk, "Prioritizing Software Security Fortification through Code-Level Security Metrics," Workshop on Quality of Protection, Alexandria, VA, pp. 31-37, October 2008.
-
(2008)
Workshop on Quality of Protection
, pp. 31-37
-
-
Gegick, M.1
Williams, L.2
Osborne, J.3
Vouk, M.4
-
13
-
-
77954505222
-
Toward nonsecurity failures as a predictor of security faults and failures
-
Leuven, Belgium, February 4-6
-
M. Gegick, P. Rotella, and L. Williams, "Toward Nonsecurity Failures as a Predictor of Security Faults and Failures," ESSoS, Leuven, Belgium, February 4-6 2009.
-
(2009)
ESSoS
-
-
Gegick, M.1
Rotella, P.2
Williams, L.3
-
14
-
-
67650114105
-
Predicting attack-prone components
-
26 January
-
M. Gegick, P. Rotella, and L. Williams, "Predicting Attack-prone Components," NCSU, Raleigh, TR-2009-1, 26 January 2009.
-
(2009)
NCSU, Raleigh, TR-2009-1
-
-
Gegick, M.1
Rotella, P.2
Williams, L.3
-
15
-
-
0003684449
-
-
New York, Springer
-
T. Hastie, R. Tibshirani, and J. H. Friedman, The Elements of Statistical Learning, New York, Springer, 2001.
-
(2001)
The Elements of Statistical Learning
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.H.3
-
18
-
-
67249086374
-
Cost curve evaluation of fault prediction models
-
Redmond, WA, 11-14 November
-
Y. Jiang, B. Cukic, and T. Menzies, "Cost Curve Evaluation of Fault Prediction Models," ISSRE, Redmond, WA, 11-14 November 2008.
-
(2008)
ISSRE
-
-
Jiang, Y.1
Cukic, B.2
Menzies, T.3
-
19
-
-
0036891333
-
Using regression trees to classify fault-prone software modules
-
December
-
T. M. Khoshgoftaar, E. B. Allen, and J. Deng, "Using Regression Trees to Classify Fault-Prone Software Modules," IEEE Transactions on Reliability, vol. 51, no. 4, pp. 455-562, December 2002.
-
(2002)
IEEE Transactions on Reliability
, vol.51
, Issue.4
, pp. 455-562
-
-
Khoshgoftaar, T.M.1
Allen, E.B.2
Deng, J.3
-
20
-
-
0012895842
-
-
Cary, NC., SAS Institute, Inc.
-
R. Littell, W. Stroup, and R. Freund, SAS for Linear Models, Fourth Edition, Cary, NC., SAS Institute, Inc., 2002.
-
(2002)
SAS for Linear Models, Fourth Edition
-
-
Littell, R.1
Stroup, W.2
Freund, R.3
-
24
-
-
33244495065
-
Static analysis tools as early indicators of pre-release defect density
-
St. Louis, MO
-
N. Nagappan and T. Ball, "Static Analysis Tools as Early Indicators of Pre-release Defect Density," ICSE, St. Louis, MO, pp. 580-586, 2005.
-
(2005)
ICSE
, pp. 580-586
-
-
Nagappan, N.1
Ball, T.2
-
25
-
-
33244463047
-
Use of relative code churn measures to predict defect density
-
St. Louis, MO, 15-21 May
-
N. Nagappan and T. Ball, "Use of Relative Code Churn Measures to Predict Defect Density," ICSE, St. Louis, MO, pp. 284-292, 15-21 May 2005.
-
(2005)
ICSE
, pp. 284-292
-
-
Nagappan, N.1
Ball, T.2
-
26
-
-
67249126825
-
Predicting vulnerable software components
-
Alexandria, VA, 29 October-2 November
-
S. Neuhaus, T. Zimmermann, C. Holler, and A. Zeller, "Predicting Vulnerable Software Components," CCS, Alexandria, VA, pp. 529-540, 29 October-2 November 2007.
-
(2007)
CCS
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
27
-
-
23744498459
-
Where the bugs are
-
ISSTA 2004 - Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis
-
T. J. Ostrand, E. J. Weyuker, and R. M. Bell, "Where the bugs are," ISSTA, Boston, Massachusetts, pp. 86-96, 2004. (Pubitemid 41121380)
-
(2004)
ISSTA 2004 - Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis
, pp. 86-96
-
-
Ostrand, T.J.1
Weyuker, E.J.2
Bell, R.M.3
-
29
-
-
67650202726
-
SAS Institute Inc.
-
SAS Institute, Inc., Cary, NC
-
SAS Institute Inc., "The Partition Platform," SAS Institute, Inc., Cary, NC, 2003.
-
(2003)
The Partition Platform
-
-
-
30
-
-
3543121509
-
Some issues in multi-phase software reliability modeling
-
Toronto, October
-
M. Vouk and K. C. Tai, "Some Issues in Multi-Phase Software Reliability Modeling," CASCON, Toronto, pp. 512-523, October 1993.
-
(1993)
CASCON
, pp. 512-523
-
-
Vouk, M.1
Tai, K.C.2
-
32
-
-
0024664438
-
Rethinking the taxonomy of fault detection techniques
-
M. Young and R. N. Taylor, "Rethinking the Taxonomy of Fault Detection Techniques," ICSE, pp. 53-62, 1989.
-
(1989)
ICSE
, pp. 53-62
-
-
Young, M.1
Taylor, R.N.2
-
33
-
-
33646501895
-
On the value of static analysis tools for fault detection
-
April
-
J. Zheng, L. Williams, W. Snipes, N. Nagappan, J. Hudepohl, and M. Vouk, "On the Value of Static Analysis Tools for Fault Detection," IEEE Transactions on Software Engineering, vol. 32, no. 4, pp. 240-253, April 2006.
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.4
, pp. 240-253
-
-
Zheng, J.1
Williams, L.2
Snipes, W.3
Nagappan, N.4
Hudepohl, J.5
Vouk, M.6
|