메뉴 건너뛰기




Volumn 5429 LNCS, Issue , 2009, Pages 135-149

Toward Non-security failures as a predictor of security faults and failures

Author keywords

Attack prone; Classification and regression tree

Indexed keywords

ATTACK-PRONE; CLASSIFICATION AND REGRESSION TREE; CLASSIFICATION AND REGRESSION TREE MODELS; COMPONENT RANKING; FALSE POSITIVE RATES; INPUT VARIABLES; PREDICTION MODEL; SECURITY FAILURE; SOFTWARE LIFE CYCLES; SOFTWARE SYSTEMS; SYSTEM COMPONENTS;

EID: 70350630478     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00199-4_12     Document Type: Conference Paper
Times cited : (13)

References (30)
  • 1
    • 34248348339 scopus 로고    scopus 로고
    • Measuring, analyzing and predicting vulnerabilities in software systems
    • Alhazmi, O.H., Malaiya, Y.K., Ray, I.: Measuring, analyzing and predicting vulnerabilities in software systems. Computers & Security 26(3), 219-228 (2006)
    • (2006) Computers & Security , vol.26 , Issue.3 , pp. 219-228
    • Alhazmi, O.H.1    Malaiya, Y.K.2    Ray, I.3
  • 2
    • 85008047921 scopus 로고    scopus 로고
    • Software Defect Reduction Top 10 List
    • Boehm, B., Basili, V.: Software Defect Reduction Top 10 List. IEEE Computer 34(1), 135-137 (2001)
    • (2001) IEEE Computer , vol.34 , Issue.1 , pp. 135-137
    • Boehm, B.1    Basili, V.2
  • 4
    • 0033697179 scopus 로고    scopus 로고
    • Denaro, G.: Estimating software fault-proneness for tuning testing activities. In: International Conference on Software Engineering, St. Malo, France, pp. 269-280 (2000) [5] Dijkstra, E.: Structured Programming, Brussels, Belgium (1970)
    • Denaro, G.: Estimating software fault-proneness for tuning testing activities. In: International Conference on Software Engineering, St. Malo, France, pp. 269-280 (2000) [5] Dijkstra, E.: Structured Programming, Brussels, Belgium (1970)
  • 5
    • 2442503135 scopus 로고    scopus 로고
    • A Handbook of Software and Systems Engineering
    • Harlow, England. Pearson Education, Limited, London 2003
    • Endres, A., Rombach, R.D.: A Handbook of Software and Systems Engineering, Harlow, England. Pearson Education, Limited, London (2003)
    • Endres, A.1    Rombach, R.D.2
  • 7
    • 70349236407 scopus 로고    scopus 로고
    • Toward the Use of Static Analysis Alerts for Early Identification of Vulnerability- and Attack-prone Components
    • Santa Clara, CA, July 1-6
    • Gegick, M., Williams, L.: Toward the Use of Static Analysis Alerts for Early Identification of Vulnerability- and Attack-prone Components. In: First International Workshop on Systems Vulnerabilities (SYVUL 2007), Santa Clara, CA, July 1-6 (2007)
    • (2007) First International Workshop on Systems Vulnerabilities (SYVUL
    • Gegick, M.1    Williams, L.2
  • 8
    • 63349084818 scopus 로고    scopus 로고
    • Gegick, M.: Failure-prone Components are also Attack-prone Components. In: OOPSLA - ACM student research competition, Nashville, Tennessee, October 2008, pp. 917-918 (2008)
    • Gegick, M.: Failure-prone Components are also Attack-prone Components. In: OOPSLA - ACM student research competition, Nashville, Tennessee, October 2008, pp. 917-918 (2008)
  • 9
    • 67249159318 scopus 로고    scopus 로고
    • STUDENT PAPER: Ranking Attack-prone Components with a Predictive Model
    • Redmond, WA, November
    • Gegick, M., Williams, L.: STUDENT PAPER: Ranking Attack-prone Components with a Predictive Model. In: International Symposium on Software Reliability Engineering, Redmond, WA, November 2008, pp. 315-316 (2008)
    • (2008) International Symposium on Software Reliability Engineering , pp. 315-316
    • Gegick, M.1    Williams, L.2
  • 10
    • 70349244714 scopus 로고    scopus 로고
    • Prioritizing Software Security Fortification through Code-Level Security Metrics
    • Alexandria, VA, pp
    • Gegick, M., Williams, L., Osborne, J., Vouk, M.: Prioritizing Software Security Fortification through Code-Level Security Metrics. In: Workshop on Quality of Protection, Alexandria, VA, pp. 31-37 (2008)
    • (2008) Workshop on Quality of Protection , pp. 31-37
    • Gegick, M.1    Williams, L.2    Osborne, J.3    Vouk, M.4
  • 13
    • 70350663921 scopus 로고    scopus 로고
    • Information Technology - Software Product Evaluation - Part 1: General Overview
    • ISO, ISO/IEC DIS 14598-1, October 28
    • ISO, ISO/IEC DIS 14598-1 Information Technology - Software Product Evaluation - Part 1: General Overview (October 28, 1996)
    • (1996)
  • 14
    • 70350670969 scopus 로고    scopus 로고
    • ISO/IEC 24765 Software and Systems Engineering Vocabulary
    • ISO/IEC 24765 Software and Systems Engineering Vocabulary (2006)
    • (2006)
  • 16
    • 0004229237 scopus 로고    scopus 로고
    • PhD Thesis in Computer Science at Purdue University, West Lafayette
    • Krsul, I.: Software Vulnerability Analysis, PhD Thesis in Computer Science at Purdue University, West Lafayette (1998)
    • (1998) Software Vulnerability Analysis
    • Krsul, I.1
  • 19
    • 33244463047 scopus 로고    scopus 로고
    • Use of Relative Code Churn Measures to Predict Defect Density
    • St. Louis, MO, May 15-21
    • Nagappan, N., Ball, T.: Use of Relative Code Churn Measures to Predict Defect Density. In: International Conference on Software Engineering, St. Louis, MO, May 15-21, 2005, pp. 284-292 (2005)
    • (2005) International Conference on Software Engineering , pp. 284-292
    • Nagappan, N.1    Ball, T.2
  • 23
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • Saltzer, J., Schroeder, M.: The Protection of Information in Computer Systems. Proceedings of the IEEE 63(9), 1278-1308 (1975)
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 24
    • 70350673648 scopus 로고    scopus 로고
    • Institute Inc, S.A.S.: The Partition Platform. SAS Institute, Inc., Cary (2003)
    • Institute Inc, S.A.S.: The Partition Platform. SAS Institute, Inc., Cary (2003)
  • 26
    • 70349263324 scopus 로고    scopus 로고
    • Is Complexity Really the Enemy of Software Security?
    • Alexandria, VA, pp
    • Shin, Y., Williams, L.: Is Complexity Really the Enemy of Software Security? In: Workshop on Quality of Protection, Alexandria, VA, pp. 47-50 (2008)
    • (2008) Workshop on Quality of Protection , pp. 47-50
    • Shin, Y.1    Williams, L.2
  • 28
    • 3543121509 scopus 로고
    • Some Issues in Multi-Phase Software Reliability Modeling
    • Toronto, October
    • Vouk, M., Tai, K.C.: Some Issues in Multi-Phase Software Reliability Modeling. In: Center for Advanced Studies Conference (CASCON), Toronto, October 1993, pp. 512-523 (1993)
    • (1993) Center for Advanced Studies Conference (CASCON) , pp. 512-523
    • Vouk, M.1    Tai, K.C.2
  • 29
    • 85014149758 scopus 로고    scopus 로고
    • 4th edn. San Francisco. Elsevier, Amsterdam
    • Witten, I., Frank, E.: Data Mining, 4th edn. San Francisco. Elsevier, Amsterdam (2005)
    • (2005) Data Mining
    • Witten, I.1    Frank, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.