메뉴 건너뛰기




Volumn , Issue , 2011, Pages 42-49

The use of application scanners in software product quality assessment

Author keywords

application scanner; bayesian net; quality assessment; quality model

Indexed keywords

BAYESIAN NET; BAYESIAN NETS; DETECTION CAPABILITY; OPEN-SOURCE; OVERALL QUALITY; QUALITY ASSESSMENT; QUALITY MODEL; QUALITY MODELS; QUALITY PROBLEMS; SOFTWARE PRODUCT QUALITY; WEB SHOP;

EID: 80053207319     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2024587.2024597     Document Type: Conference Paper
Times cited : (3)

References (29)
  • 2
    • 84882651303 scopus 로고    scopus 로고
    • Why to adopt a security metric? A brief survey
    • Quality of Protection, Springer
    • A. Atzeni and A. Lioy. Why to adopt a security metric? a brief survey. In Quality of Protection, volume 23 of Advanced in Information Security, pages 1-12. Springer, 2006.
    • (2006) Advanced in Information Security , vol.23 , pp. 1-12
    • Atzeni, A.1    Lioy, A.2
  • 5
    • 0024031604 scopus 로고
    • TAME PROJECT: TOWARDS IMPROVEMENT-ORIENTED SOFTWARE ENVIRONMENTS.
    • DOI 10.1109/32.6156
    • V. Basili and H. Rombach. The TAME project: Towards improvement-oriented software environments. IEEE Transactions on Software Engineering, 14(6):758-773, 1988. (Pubitemid 18640017)
    • (1988) IEEE Transactions on Software Engineering , vol.14 , Issue.6 , pp. 758-773
    • Basili, V.R.1    Rombach H.Dieter2
  • 13
    • 77954617636 scopus 로고    scopus 로고
    • Federal Office for Information Security (BSI) in Germany. IT-Grundschutz Catalogues. https://www.bsi.bund.de/, 2007.
    • (2007) IT-Grundschutz Catalogues
  • 14
    • 34648846066 scopus 로고    scopus 로고
    • Using ranked nodes to model qualitative judgments in bayesian networks
    • DOI 10.1109/TKDE.2007.1073
    • N. E. Fenton, M. Neil, and J. G. Caballero. Using ranked nodes to model qualitative judgments in Bayesian networks. IEEE Transactions on Knowledge and Data Engineering, 19(10):1420-1432, 2007. (Pubitemid 47460364)
    • (2007) IEEE Transactions on Knowledge and Data Engineering , vol.19 , Issue.10 , pp. 1420-1432
    • Fenton, N.E.1    Neil, M.2    Caballero, J.G.3
  • 18
    • 34547107609 scopus 로고    scopus 로고
    • Organizing security patterns
    • DOI 10.1109/MS.2007.114
    • M. Hafiz, P. Adamczyk, and R. Johnson. Organizing security patterns. IEEE Softw., 24(4):52-60, 2007. (Pubitemid 47098794)
    • (2007) IEEE Software , vol.24 , Issue.4 , pp. 52-60
    • Hafiz, M.1    Adamczyk, P.2    Johnson, R.E.3
  • 26
    • 77956403351 scopus 로고    scopus 로고
    • A Bayesian network approach to assess and predict software quality using activity-based quality models
    • S. Wagner. A Bayesian network approach to assess and predict software quality using activity-based quality models. Information and Software Technology, 52(11):1230-1241, 2010.
    • (2010) Information and Software Technology , vol.52 , Issue.11 , pp. 1230-1241
    • Wagner, S.1
  • 28
    • 59049093651 scopus 로고    scopus 로고
    • A comprehensive model of usability
    • Proc. Engineering Interactive Systems 2007 EIS '07, Springer
    • S. Winter, S. Wagner, and F. Deissenboeck. A comprehensive model of usability. In In Proc. Engineering Interactive Systems 2007 (EIS '07, volume 4940 of LNCS, pages 106-122. Springer, 2007.
    • (2007) LNCS , vol.4940 , pp. 106-122
    • Winter, S.1    Wagner, S.2    Deissenboeck, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.