-
1
-
-
34248348339
-
Measuring, analyzing and predicting vulnerabilities in software systems
-
Alhazmi, O.H., Malaiya, Y.K., Ray, I.: Measuring, analyzing and predicting vulnerabilities in software systems. Computers & Security 26(3), 219-228 (2006)
-
(2006)
Computers & Security
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
Ray, I.3
-
2
-
-
85008047921
-
Software Defect Reduction Top 10 List
-
Boehm, B., Basili, V.: Software Defect Reduction Top 10 List. IEEE Computer 34(1), 135-137 (2001)
-
(2001)
IEEE Computer
, vol.34
, Issue.1
, pp. 135-137
-
-
Boehm, B.1
Basili, V.2
-
3
-
-
47349084770
-
Applying Software Reliability Models on Security Incidents
-
Sweden
-
Codon, E., Cukier, M., He, T.: Applying Software Reliability Models on Security Incidents. In: International Symposium on Software Reliability Engineering, Trollhattan, Sweden (2007)
-
(2007)
International Symposium on Software Reliability Engineering, Trollhattan
-
-
Codon, E.1
Cukier, M.2
He, T.3
-
4
-
-
0033697179
-
-
Denaro, G.: Estimating software fault-proneness for tuning testing activities. In: International Conference on Software Engineering, St. Malo, France, pp. 269-280 (2000) [5] Dijkstra, E.: Structured Programming, Brussels, Belgium (1970)
-
Denaro, G.: Estimating software fault-proneness for tuning testing activities. In: International Conference on Software Engineering, St. Malo, France, pp. 269-280 (2000) [5] Dijkstra, E.: Structured Programming, Brussels, Belgium (1970)
-
-
-
-
5
-
-
2442503135
-
A Handbook of Software and Systems Engineering
-
Harlow, England. Pearson Education, Limited, London 2003
-
Endres, A., Rombach, R.D.: A Handbook of Software and Systems Engineering, Harlow, England. Pearson Education, Limited, London (2003)
-
-
-
Endres, A.1
Rombach, R.D.2
-
6
-
-
7744220722
-
-
Cary, NC. SAS Institute, Inc
-
Freund, R., Littell, R., Creighton, L.: Regression Using JMP, Cary, NC. SAS Institute, Inc. (2003)
-
(2003)
Regression Using JMP
-
-
Freund, R.1
Littell, R.2
Creighton, L.3
-
7
-
-
70349236407
-
Toward the Use of Static Analysis Alerts for Early Identification of Vulnerability- and Attack-prone Components
-
Santa Clara, CA, July 1-6
-
Gegick, M., Williams, L.: Toward the Use of Static Analysis Alerts for Early Identification of Vulnerability- and Attack-prone Components. In: First International Workshop on Systems Vulnerabilities (SYVUL 2007), Santa Clara, CA, July 1-6 (2007)
-
(2007)
First International Workshop on Systems Vulnerabilities (SYVUL
-
-
Gegick, M.1
Williams, L.2
-
8
-
-
63349084818
-
-
Gegick, M.: Failure-prone Components are also Attack-prone Components. In: OOPSLA - ACM student research competition, Nashville, Tennessee, October 2008, pp. 917-918 (2008)
-
Gegick, M.: Failure-prone Components are also Attack-prone Components. In: OOPSLA - ACM student research competition, Nashville, Tennessee, October 2008, pp. 917-918 (2008)
-
-
-
-
9
-
-
67249159318
-
STUDENT PAPER: Ranking Attack-prone Components with a Predictive Model
-
Redmond, WA, November
-
Gegick, M., Williams, L.: STUDENT PAPER: Ranking Attack-prone Components with a Predictive Model. In: International Symposium on Software Reliability Engineering, Redmond, WA, November 2008, pp. 315-316 (2008)
-
(2008)
International Symposium on Software Reliability Engineering
, pp. 315-316
-
-
Gegick, M.1
Williams, L.2
-
10
-
-
70349244714
-
Prioritizing Software Security Fortification through Code-Level Security Metrics
-
Alexandria, VA, pp
-
Gegick, M., Williams, L., Osborne, J., Vouk, M.: Prioritizing Software Security Fortification through Code-Level Security Metrics. In: Workshop on Quality of Protection, Alexandria, VA, pp. 31-37 (2008)
-
(2008)
Workshop on Quality of Protection
, pp. 31-37
-
-
Gegick, M.1
Williams, L.2
Osborne, J.3
Vouk, M.4
-
12
-
-
0003684449
-
-
Springer, New York
-
Hastie, T., Tibshirani, R., Friedman, J.H.: The Elements of Statistical Learning. Springer, New York (2001)
-
(2001)
The Elements of Statistical Learning
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.H.3
-
13
-
-
70350663921
-
Information Technology - Software Product Evaluation - Part 1: General Overview
-
ISO, ISO/IEC DIS 14598-1, October 28
-
ISO, ISO/IEC DIS 14598-1 Information Technology - Software Product Evaluation - Part 1: General Overview (October 28, 1996)
-
(1996)
-
-
-
14
-
-
70350670969
-
-
ISO/IEC 24765 Software and Systems Engineering Vocabulary
-
ISO/IEC 24765 Software and Systems Engineering Vocabulary (2006)
-
(2006)
-
-
-
15
-
-
0000178692
-
Using Classification Trees for Software Quality Models: Lessons Learned
-
Khoshgoftaar, T.M., Allen, E.B., Naik, A., Jones, W., Hudepohl, J.P.: Using Classification Trees for Software Quality Models: Lessons Learned. International Journal on Software Engineering and Knowledge Engineering 9(2), 212-231 (1999)
-
(1999)
International Journal on Software Engineering and Knowledge Engineering
, vol.9
, Issue.2
, pp. 212-231
-
-
Khoshgoftaar, T.M.1
Allen, E.B.2
Naik, A.3
Jones, W.4
Hudepohl, J.P.5
-
16
-
-
0004229237
-
-
PhD Thesis in Computer Science at Purdue University, West Lafayette
-
Krsul, I.: Software Vulnerability Analysis, PhD Thesis in Computer Science at Purdue University, West Lafayette (1998)
-
(1998)
Software Vulnerability Analysis
-
-
Krsul, I.1
-
17
-
-
70350691580
-
-
Milan, Italy, September 15
-
Mullen, R., Gokhale, S.: A Discrete Lognormal Model for Software Defects Affecting QoP. Quality of Protection, Milan, Italy, September 15 (2005)
-
(2005)
A Discrete Lognormal Model for Software Defects Affecting QoP. Quality of Protection
-
-
Mullen, R.1
Gokhale, S.2
-
19
-
-
33244463047
-
Use of Relative Code Churn Measures to Predict Defect Density
-
St. Louis, MO, May 15-21
-
Nagappan, N., Ball, T.: Use of Relative Code Churn Measures to Predict Defect Density. In: International Conference on Software Engineering, St. Louis, MO, May 15-21, 2005, pp. 284-292 (2005)
-
(2005)
International Conference on Software Engineering
, pp. 284-292
-
-
Nagappan, N.1
Ball, T.2
-
20
-
-
67249126825
-
Predicting Vulnerable Software Components
-
Alexandria, VA, 29 October-2 November
-
Neuhaus, S., Zimmermann, T., Holler, C., Zeller, A.: Predicting Vulnerable Software Components. In: Computer and Communications Security, Alexandria, VA, 29 October-2 November 2007, pp. 529-540 (2007)
-
(2007)
Computer and Communications Security
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
21
-
-
23744498459
-
Where the bugs are
-
Boston, Massachusetts, pp
-
Ostrand, T.J., Weyuker, E.J., Bell, R.M.: Where the bugs are. In: International Symposium on Software Testing and Analysis, Boston, Massachusetts, pp. 86-96 (2004)
-
(2004)
International Symposium on Software Testing and Analysis
, pp. 86-96
-
-
Ostrand, T.J.1
Weyuker, E.J.2
Bell, R.M.3
-
23
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Saltzer, J., Schroeder, M.: The Protection of Information in Computer Systems. Proceedings of the IEEE 63(9), 1278-1308 (1975)
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
24
-
-
70350673648
-
-
Institute Inc, S.A.S.: The Partition Platform. SAS Institute, Inc., Cary (2003)
-
Institute Inc, S.A.S.: The Partition Platform. SAS Institute, Inc., Cary (2003)
-
-
-
-
25
-
-
34247346109
-
Predicting Component Failures at Design Time
-
Rio de Janeiro, Brazil, September 21-22
-
Schroter, A., Zimmermann, T., Zeller, A.: Predicting Component Failures at Design Time. In: International Symposium on Empirical Software Engineering, Rio de Janeiro, Brazil, September 21-22, 2006, pp. 18-27 (2006)
-
(2006)
International Symposium on Empirical Software Engineering
, pp. 18-27
-
-
Schroter, A.1
Zimmermann, T.2
Zeller, A.3
-
26
-
-
70349263324
-
Is Complexity Really the Enemy of Software Security?
-
Alexandria, VA, pp
-
Shin, Y., Williams, L.: Is Complexity Really the Enemy of Software Security? In: Workshop on Quality of Protection, Alexandria, VA, pp. 47-50 (2008)
-
(2008)
Workshop on Quality of Protection
, pp. 47-50
-
-
Shin, Y.1
Williams, L.2
-
28
-
-
3543121509
-
Some Issues in Multi-Phase Software Reliability Modeling
-
Toronto, October
-
Vouk, M., Tai, K.C.: Some Issues in Multi-Phase Software Reliability Modeling. In: Center for Advanced Studies Conference (CASCON), Toronto, October 1993, pp. 512-523 (1993)
-
(1993)
Center for Advanced Studies Conference (CASCON)
, pp. 512-523
-
-
Vouk, M.1
Tai, K.C.2
-
29
-
-
85014149758
-
-
4th edn. San Francisco. Elsevier, Amsterdam
-
Witten, I., Frank, E.: Data Mining, 4th edn. San Francisco. Elsevier, Amsterdam (2005)
-
(2005)
Data Mining
-
-
Witten, I.1
Frank, E.2
-
30
-
-
33646501895
-
On the Value of Static Analysis Tools for Fault Detection
-
Zheng, J., Williams, L., Snipes, W., Nagappan, N., Hudepohl, J., Vouk, M.: On the Value of Static Analysis Tools for Fault Detection. IEEE Transactions on Software Engineering 32(4), 240-253 (2006)
-
(2006)
IEEE Transactions on Software Engineering
, vol.32
, Issue.4
, pp. 240-253
-
-
Zheng, J.1
Williams, L.2
Snipes, W.3
Nagappan, N.4
Hudepohl, J.5
Vouk, M.6
|