-
1
-
-
33750962700
-
Modeling the vulnerability discovery process
-
O. Alhazmi and Y. Malaiya. Modeling the vulnerability discovery process. In Proc. of ISSRE'05, pages 129-138, 2005.
-
(2005)
Proc. of ISSRE'05
, pp. 129-138
-
-
Alhazmi, O.1
Malaiya, Y.2
-
2
-
-
41449117969
-
Application of vulnerability discovery models to major operating systems
-
O. Alhazmi and Y. Malaiya. Application of vulnerability discovery models to major operating systems. IEEE Trans. on Reliab., 57(1):14-22, 2008.
-
(2008)
IEEE Trans. on Reliab.
, vol.57
, Issue.1
, pp. 14-22
-
-
Alhazmi, O.1
Malaiya, Y.2
-
3
-
-
34248348339
-
Measuring, analyzing and predicting security vulnerabilities in software systems
-
DOI 10.1016/j.cose.2006.10.002, PII S0167404806001520
-
O. Alhazmi, Y. Malaiya, and I. Ray. Measuring, analyzing and predicting security vulnerabilities in software systems. Comp. & Sec., 26(3):219-228, 2007. (Pubitemid 46734415)
-
(2007)
Computers and Security
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
Ray, I.3
-
5
-
-
60249092995
-
A systematic review of software fault prediction studies
-
C. Catal and B. Diri. A systematic review of software fault prediction studies. Expert Sys. with App., 36(4):7346-7354, 2009.
-
(2009)
Expert Sys. with App.
, vol.36
, Issue.4
, pp. 7346-7354
-
-
Catal, C.1
Diri, B.2
-
6
-
-
78649401190
-
Using complexity, coupling, and cohesion metrics as early predictors of vul
-
I. Chowdhury and M. Zulkernine. Using complexity, coupling, and cohesion metrics as early predictors of vul. J. of Soft. Arch., 2010.
-
(2010)
J. of Soft. Arch.
-
-
Chowdhury, I.1
Zulkernine, M.2
-
7
-
-
76149092560
-
Firefox (in) security update dynamics exposed
-
S. Frei, T. Duebendorfer, and B. Plattner. Firefox (in) security update dynamics exposed. ACM SIGCOMM Comp. Comm. Rev., 39(1):16-22, 2009.
-
(2009)
ACM SIGCOMM Comp. Comm. Rev.
, vol.39
, Issue.1
, pp. 16-22
-
-
Frei, S.1
Duebendorfer, T.2
Plattner, B.3
-
8
-
-
70350630478
-
Toward non-security failures as a predictor of security faults and failures
-
M. Gegick, P. Rotella, and L. Williams. Toward non-security failures as a predictor of security faults and failures. Eng. Secure Soft. and Sys., 5429:135-149, 2009.
-
(2009)
Eng. Secure Soft. and Sys.
, vol.5429
, pp. 135-149
-
-
Gegick, M.1
Rotella, P.2
Williams, L.3
-
12
-
-
57049102518
-
Comparing design and code metrics for software quality prediction
-
ACM
-
Y. Jiang, B. Cuki, T. Menzies, and N. Bartlow. Comparing design and code metrics for software quality prediction. In Proc. of PROMISE'08, pages 11-18. ACM, 2008.
-
(2008)
Proc. of PROMISE'08
, pp. 11-18
-
-
Jiang, Y.1
Cuki, B.2
Menzies, T.3
Bartlow, N.4
-
14
-
-
74049133901
-
Secure open source collaboration: An empirical study of linus' law
-
A. Meneely and L. Williams. Secure open source collaboration: An empirical study of linus' law. In Proc. of CCS'09, 2009.
-
Proc. of CCS'09, 2009
-
-
Meneely, A.1
Williams, L.2
-
15
-
-
33845782503
-
Data mining static code attributes to learn defect predictors
-
T. Menzies, J. Greenwald, and A. Frank. Data mining static code attributes to learn defect predictors. TSE, 33(9):2-13, 2007.
-
(2007)
TSE
, vol.33
, Issue.9
, pp. 2-13
-
-
Menzies, T.1
Greenwald, J.2
Frank, A.3
-
16
-
-
33244463047
-
Use of relative code churn measures to predict system defect density
-
N. Nagappan and T. Ball. Use of relative code churn measures to predict system defect density. In Proc. of ICSE'05, pages 284-292, 2005.
-
(2005)
Proc. of ICSE'05
, pp. 284-292
-
-
Nagappan, N.1
Ball, T.2
-
17
-
-
67249126825
-
Predicting vulnerable software components
-
October
-
S. Neuhaus, T. Zimmermann, C. Holler, and A. Zeller. Predicting vulnerable software components. In Proc. of CCS'07, pages 529-540, October 2007.
-
(2007)
Proc. of CCS'07
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
18
-
-
34248659137
-
Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes
-
H. M. Olague, S. Gholston, and S. Quattlebaum. Empirical validation of three software metrics suites to predict fault-proneness of object-oriented classes developed using highly iterative or agile software development processes. TSE, 33(6):402-419, 2007.
-
(2007)
TSE
, vol.33
, Issue.6
, pp. 402-419
-
-
Olague, H.M.1
Gholston, S.2
Quattlebaum, S.3
-
20
-
-
78649415681
-
Software security growth modeling: Examining vulnerabilities with reliability growth models
-
A. Ozment. Software security growth modeling: Examining vulnerabilities with reliability growth models. In Proc. of QoP'06, 2006.
-
Proc. of QoP'06, 2006
-
-
Ozment, A.1
-
22
-
-
14744276335
-
Is finding security holes a good idea?
-
E. Rescorla. Is finding security holes a good idea? IEEE Sec. and Privacy, 3(1):14-19, 2005.
-
(2005)
IEEE Sec. and Privacy
, vol.3
, Issue.1
, pp. 14-19
-
-
Rescorla, E.1
-
23
-
-
62949190483
-
An empirical model to predict security vulnerabilities using code complexity metrics
-
Y. Shin and L. Williams. An empirical model to predict security vulnerabilities using code complexity metrics. In Proc. of ESEM'08, 2008.
-
Proc. of ESEM'08, 2008
-
-
Shin, Y.1
Williams, L.2
-
24
-
-
70349263324
-
Is complexity really the enemy of software security?
-
Y. Shin and L. Williams. Is complexity really the enemy of software security? In Proc. of QoP'08, pages 47-50, 2008.
-
(2008)
Proc. of QoP'08
, pp. 47-50
-
-
Shin, Y.1
Williams, L.2
-
26
-
-
34548253429
-
Comments on data mining static code attributes to learn defect predictors
-
H. Zhang and X. Zhang. Comments on data mining static code attributes to learn defect predictors. TSE, 33(9):635-637, 2007.
-
(2007)
TSE
, vol.33
, Issue.9
, pp. 635-637
-
-
Zhang, H.1
Zhang, X.2
-
27
-
-
50049132401
-
Predicting defective software components from code complexity measures
-
H. Zhang, X. Zhang, and M. Gu. Predicting defective software components from code complexity measures. In Procc. of PRDC'07, pages 93-96, 2007.
-
(2007)
Procc. of PRDC'07
, pp. 93-96
-
-
Zhang, H.1
Zhang, X.2
Gu, M.3
|