-
2
-
-
84859017218
-
-
accessed June 4, 2011
-
BuildBot, http://trac.buildbot.net/wiki/SuccessStories, accessed June 4, 2011.
-
-
-
-
3
-
-
79952574726
-
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities
-
March 2011
-
I.Chowdhury and M.Zulkernine. 2011. Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities. J. Syst. Archit. 57, 3 (March 2011), 294-313.
-
(2011)
J. Syst. Archit.
, vol.57
, Issue.3
, pp. 294-313
-
-
Chowdhury, I.1
Zulkernine, M.2
-
5
-
-
84859013698
-
-
published May 22, 2007
-
S.M. Christey and R. A. Martin, http://www.cve.mitre.org/docs/vuln- trends/index.html, published May 22, 2007.
-
-
-
Christey, S.M.1
Martin, R.A.2
-
6
-
-
84859030733
-
-
accessed June 4, 2011
-
http://pear.php.net/package/PHP CodeSniffer/ accessed June 4, 2011.
-
-
-
-
8
-
-
84859023993
-
-
accessed June 4, 2011
-
http://cve.mitre.org/cve/editorial policies/cd abstraction.html, accessed June 4, 2011.
-
-
-
-
9
-
-
69949156316
-
-
July
-
Fortify Security Research Group and Larry Suto, "Open Source Security Study," http://www.fortify.com/landing/oss/oss report.jsp, July 2008.
-
(2008)
Open Source Security Study
-
-
-
11
-
-
70349244714
-
Prioritizing software security fortification through code-level metrics
-
ACM, New York, NY, USA
-
M. Gegick, L. Williams, J. Osborne, and M. Vouk. 2008. Prioritizing software security fortification through code-level metrics. In Proceedings of the 4th ACM workshop on Quality of protection (QoP '08). ACM, New York, NY, USA, 31-38.
-
(2008)
Proceedings of the 4th ACM Workshop on Quality of Protection (QoP '08)
, pp. 31-38
-
-
Gegick, M.1
Williams, L.2
Osborne, J.3
Vouk, M.4
-
13
-
-
79551563663
-
After-life vulnerabilities: A study on firefox evolution, its vulnerabilities, and fixes
-
Springer-Verlag, Berlin, Heidelberg
-
F. Massacci, S. Neuhaus, and V. Nguyen. 2011. "After-life vulnerabilities: a study on firefox evolution, its vulnerabilities, and fixes." In Proceedings of the Third international conference on Engineering secure software and systems (ESSoS'11), Springer-Verlag, Berlin, Heidelberg, 195-208.
-
(2011)
Proceedings of the Third International Conference on Engineering Secure Software and Systems (ESSoS'11)
, pp. 195-208
-
-
Massacci, F.1
Neuhaus, S.2
Nguyen, V.3
-
14
-
-
84859013407
-
LizaMoon Mass SQL Injection Attack Points to Rogue AV Site
-
March 29
-
F.Rashid, "LizaMoon Mass SQL Injection Attack Points to Rogue AV Site," eWeek, http://www.eweek.com/c/a/Security/LizaMoon-Mass-SQL- Injection-Attack-Points-to-Rogue-AV-Site-852537/, March 29, 2011.
-
(2011)
eWeek
-
-
Rashid, F.1
-
15
-
-
0017291489
-
A Complexity Measure
-
IEEE Press, New York
-
T.J. McCabe, "A Complexity Measure", IEEE Transactions on Software Engineering, 2(4), IEEE Press, New York, 1976, pp. 308-320.
-
(1976)
IEEE Transactions on Software Engineering
, vol.2
, Issue.4
, pp. 308-320
-
-
McCabe, T.J.1
-
17
-
-
33244495065
-
Static analysis tools as early indicators of pre-release defect density
-
N. Nagappan and T. Ball, "Static analysis tools as early indicators of pre-release defect density", Proceedings of the 27th International Conference on Software Engineering, Association of Computing Machinery, New York, 2005, pp. 580 - 586.
-
Proceedings of the 27th International Conference on Software Engineering, Association of Computing Machinery, New York, 2005
, pp. 580-586
-
-
Nagappan, N.1
Ball, T.2
-
18
-
-
33749637286
-
Mining Metrics to Predict Component Failures
-
N. Nagappan, T. Ball, and A. Zeller, "Mining Metrics to Predict Component Failures", Proceedings of the 28th International Conference on Software Engineering, Association of Computing Machinery, New York, 2006, pp. 452-461.
-
Proceedings of the 28th International Conference on Software Engineering, Association of Computing Machinery, New York, 2006
, pp. 452-461
-
-
Nagappan, N.1
Ball, T.2
Zeller, A.3
-
19
-
-
84859013691
-
-
accessed June 4, 2011
-
NVD, http://nvd.nist.gov/, accessed June 4, 2011.
-
-
-
-
20
-
-
84859055602
-
-
accessed June 4, 2011
-
OWASP, https://www.owasp.org/index.php/Top 10 2010-Main, accessed June 4, 2011.
-
-
-
-
21
-
-
77953734916
-
Replicating MSR: A Study of the Potential Replicability of Papers Published in the Mining Software Repositories Proceedings
-
G. Robles. "Replicating MSR: A Study of the Potential Replicability of Papers Published in the Mining Software Repositories Proceedings." In Proceedings of the Working Conference on Mining Software Repositories, 2010.
-
Proceedings of the Working Conference on Mining Software Repositories, 2010
-
-
Robles, G.1
-
22
-
-
83555172467
-
Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
-
to appear
-
Y.Shin, A.Meneely, L.Williams, J.Osbourne, Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities, IEEE Transactions in Software Engineering, to appear, 2011.
-
(2011)
IEEE Transactions in Software Engineering
-
-
Shin, Y.1
Meneely, A.2
Williams, L.3
Osbourne, J.4
-
23
-
-
72449154095
-
Security of Open Source Web Applications
-
J.Walden, M.Doyle, G.Welch, M.Whelan, "Security of Open Source Web Applications," Proc. International Workshop on Security Measurements and Metrics (MetriSec'09), Lake Buena Vista, Florida, Oct. 14, 2009.
-
Proc. International Workshop on Security Measurements and Metrics (MetriSec'09), Lake Buena Vista, Florida, Oct. 14, 2009
-
-
Walden, J.1
Doyle, M.2
Welch, G.3
Whelan, M.4
-
24
-
-
84859013692
-
-
accessed June 4, 2011
-
Web Application Security Consortium, Web Application Hacking Incident Database, http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident- Database, accessed June 4, 2011.
-
Web Application Hacking Incident Database
-
-
-
25
-
-
84859013693
-
-
accessed June 4, 2011
-
D.A. Wheeler, http://www.dwheeler.com/sloccount/ accessed June 4, 2011.
-
-
-
Wheeler, D.A.1
|