-
1
-
-
84925838576
-
Why information security is hard - An economic perspective
-
R. Anderson. Why information security is hard - an economic perspective. In Proc. of ACSAC'01, 2001.
-
Proc. of ACSAC'01, 2001
-
-
Anderson, R.1
-
2
-
-
60249092995
-
A systematic review of software fault prediction studies
-
C. Catal and B. Diri. A systematic review of software fault prediction studies. Expert Sys. with App., 36(4):7346-7354, 2009.
-
(2009)
Expert Sys. with App.
, vol.36
, Issue.4
, pp. 7346-7354
-
-
Catal, C.1
Diri, B.2
-
3
-
-
78649401190
-
Using complexity, coupling, and cohesion metrics as early predictors of vul
-
I. Chowdhury and M. Zulkernine. Using complexity, coupling, and cohesion metrics as early predictors of vul. J. of Soft. Arch., 2010.
-
(2010)
J. of Soft. Arch.
-
-
Chowdhury, I.1
Zulkernine, M.2
-
5
-
-
63349084818
-
Failure-prone components are also attack-prone components
-
ACM Press
-
M. Gegick. Failure-prone components are also attack-prone components. In Proc. of the 23rd ACM SIGPLAN Conf. on Object-Oriented Prog. , Sys. , Lang. , and Applications (OOPSLA'08), pages 917-918. ACM Press, 2008.
-
(2008)
Proc. of the 23rd ACM SIGPLAN Conf. on Object-Oriented Prog., Sys., Lang., and Applications (OOPSLA'08)
, pp. 917-918
-
-
Gegick, M.1
-
6
-
-
67249159318
-
Ranking attack-prone components with a predictive model
-
M. Gegick and L. Williams. Ranking attack-prone components with a predictive model. In Proc. of ISSRE'08, pages 315-316, 2008.
-
(2008)
Proc. of ISSRE'08
, pp. 315-316
-
-
Gegick, M.1
Williams, L.2
-
7
-
-
70349244714
-
Prioritizing software security fortification throughcode-level metrics
-
ACM
-
M. Gegick, L. Williams, J. Osborne, and M. Vouk. Prioritizing software security fortification throughcode-level metrics. In Proc. of QoP'08, pages 31-38. ACM, 2008.
-
(2008)
Proc. of QoP'08
, pp. 31-38
-
-
Gegick, M.1
Williams, L.2
Osborne, J.3
Vouk, M.4
-
8
-
-
57049102518
-
Comparing design and code metrics for software quality prediction
-
ACM
-
Y. Jiang, B. Cuki, T. Menzies, and N. Bartlow. Comparing design and code metrics for software quality prediction. In Proc. of PROMISE'08, pages 11-18. ACM, 2008.
-
(2008)
Proc. of PROMISE'08
, pp. 11-18
-
-
Jiang, Y.1
Cuki, B.2
Menzies, T.3
Bartlow, N.4
-
9
-
-
78649402467
-
Which is the right source for vulnerabilities studies? an empirical analysis on mozilla firefox
-
F. Massacci and V. H. Nguyen. Which is the right source for vulnerabilities studies? an empirical analysis on mozilla firefox. In Proc. of MetriSec'10, 2010.
-
Proc. of MetriSec'10, 2010
-
-
Massacci, F.1
Nguyen, V.H.2
-
10
-
-
33845782503
-
Data mining static code attributes to learn defect predictors
-
T. Menzies, J. Greenwald, and A. Frank. Data mining static code attributes to learn defect predictors. TSE, 33(9):2-13, 2007.
-
(2007)
TSE
, vol.33
, Issue.9
, pp. 2-13
-
-
Menzies, T.1
Greenwald, J.2
Frank, A.3
-
11
-
-
33244463047
-
Use of relative code churn measures to predict system defect density
-
N. Nagappan and T. Ball. Use of relative code churn measures to predict system defect density. In Proc. of ICSE'05, pages 284-292, 2005.
-
(2005)
Proc. of ICSE'05
, pp. 284-292
-
-
Nagappan, N.1
Ball, T.2
-
12
-
-
67249126825
-
Predicting vulnerable software components
-
October
-
S. Neuhaus, T. Zimmermann, C. Holler, and A. Zeller. Predicting vulnerable software components. In Proc. of CCS'07, pages 529-540, October 2007.
-
(2007)
Proc. of CCS'07
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
13
-
-
34248659137
-
Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes
-
H. M. Olague, S. Gholston, and S. Quattlebaum. Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes. TSE, 33(6):402-419, 2007.
-
(2007)
TSE
, vol.33
, Issue.6
, pp. 402-419
-
-
Olague, H.M.1
Gholston, S.2
Quattlebaum, S.3
-
14
-
-
41149163848
-
How to measure success of fault prediction models
-
New York, NY, USA, ACM
-
T. J. Ostrand and E. J. Weyuker. How to measure success of fault prediction models. In SOQUA '07: Fourth international workshop on Software quality assurance, pages 25-30, New York, NY, USA, 2007. ACM.
-
(2007)
SOQUA '07: Fourth International Workshop on Software Quality Assurance
, pp. 25-30
-
-
Ostrand, T.J.1
Weyuker, E.J.2
-
17
-
-
62949190483
-
An empirical model to predict security vulnerabilities using code complexity metrics
-
Y. Shin and L. Williams. An empirical model to predict security vulnerabilities using code complexity metrics. In Proc. of ESEM'08, 2008.
-
Proc. of ESEM'08, 2008.
-
-
Shin, Y.1
Williams, L.2
-
18
-
-
70349263324
-
Is complexity really the enemy of software security?
-
Y. Shin and L. Williams. Is complexity really the enemy of software security? In Proc. of QoP'08, pages 47-50, 2008.
-
(2008)
Proc. of QoP'08
, pp. 47-50
-
-
Shin, Y.1
Williams, L.2
-
19
-
-
34548388395
-
-
Office for Research Development and Education, version 1.1.23-r6.
-
Wessa. P. (2010), Free Statistics Software, Office for Research Development and Education, version 1.1.23-r6. http://www.wessa.net/.
-
(2010)
Free Statistics Software
-
-
Wessa, P.1
-
20
-
-
34548253429
-
Comments on data mining static code attributes to learn defect predictors
-
H. Zhang and X. Zhang. Comments on data mining static code attributes to learn defect predictors. TSE, 33(9):635-637, 2007.
-
(2007)
TSE
, vol.33
, Issue.9
, pp. 635-637
-
-
Zhang, H.1
Zhang, X.2
-
21
-
-
50049132401
-
Predicting defective software components from code complexity measures
-
H. Zhang, X. Zhang, and M. Gu. Predicting defective software components from code complexity measures. In Procc. of PRDC'07, pages 93-96, 2007.
-
(2007)
Procc. of PRDC'07
, pp. 93-96
-
-
Zhang, H.1
Zhang, X.2
Gu, M.3
|