-
1
-
-
34248348339
-
Measuring, analyzing and predicting security vulnerabilities in software systems
-
10.1016/j.cose.2006.10.002
-
Alhazmi OH, Malaiya YK, Ray I (2007) Measuring, analyzing and predicting security vulnerabilities in software systems. Comput Secur 26(3):219-228
-
(2007)
Comput Secur
, vol.26
, Issue.3
, pp. 219-228
-
-
Alhazmi, O.H.1
Malaiya, Y.K.2
Ray, I.3
-
2
-
-
70349105844
-
Is it a bug or an enhancement? A text-based approach to classify change requests
-
27-30 Ontario, Canada
-
Antoniol G, Ayari K, Penta MD, Khomh F, Guéhéneuc Y-G (Oct. 27-30 2008) Is it a bug or an enhancement? A text-based approach to classify change requests. In: 2008 Conference of the Center for Advanced Studies on Collaborative Research, Ontario, Canada.
-
(2008)
2008 Conference of the Center for Advanced Studies on Collaborative Research
-
-
Antoniol, G.A.1
-
4
-
-
47349112859
-
Data mining techniques for building fault-proneness models in telecom Java Software
-
5-9 Nov Trollhättan, Sweden
-
Arisholm E, Briand LC, Fuglerud M (5-9 Nov. 2007) Data mining techniques for building fault-proneness models in telecom Java Software. In: 18th IEEE Int'l Symposium on Software Reliability Engineering (ISSRE'07), Trollhättan, Sweden, pp. 215-224.
-
(2007)
18th IEEE Int'l Symposium on Software Reliability Engineering (ISSRE'07)
, pp. 215-224
-
-
Arisholm, E.1
Briand, L.C.2
Fuglerud, M.3
-
5
-
-
0001622174
-
A validation of object-oriented design metrics as quality indicators
-
10.1109/32.544352
-
Basili VR, Briand LC, Melo WL (1996) A validation of object-oriented design metrics as quality indicators. IEEE Trans Software Eng 22(10):751-761
-
(1996)
IEEE Trans Software Eng
, vol.22
, Issue.10
, pp. 751-761
-
-
Basili, V.R.1
Briand, L.C.2
Melo, W.L.3
-
7
-
-
0019392830
-
Comparison of sampling procedure and data analysis for a Land-Use and Land-Cover Map
-
Fitzpatrick-Linz K (1981) Comparison of sampling procedure and data analysis for a Land-Use and Land-Cover Map. Photogramm Eng Rem Sens 47(3):343-351
-
(1981)
Photogramm Eng Rem Sens
, vol.47
, Issue.3
, pp. 343-351
-
-
Fitzpatrick-Linz, K.1
-
8
-
-
77954505222
-
Toward non-security failures as a predictor of security faults and failures
-
Leuven, Belgium, February 04-06
-
Gegick M, Rotella P, Williams L (2009) Toward non-security failures as a predictor of security faults and failures. Paper presented at the International Symposium on Engineering Secure Software and Systems, Leuven, Belgium, February 04-06.
-
(2009)
International Symposium on Engineering Secure Software and Systems
-
-
Gegick, M.1
Rotella, P.2
Williams, L.3
-
9
-
-
70349244714
-
-
Oct. 27 Prioritizing software security fortification through code-level metrics Alexandria, Virginia
-
Gegick M, Williams L, Osborne J, Vouk M (Oct. 27 2008) Prioritizing software security fortification through code-level metrics. In: 4th ACM workshop on Quality of protection, Alexandria, Virginia, pp 31-38.
-
(2008)
4th ACM Workshop on Quality of Protection
, pp. 31-38
-
-
Gegick, M.1
Williams, L.2
Osborne, J.3
Vouk, M.4
-
10
-
-
0034226738
-
Predicting fault incidence using software change history
-
10.1109/32.859533
-
Graves TL, Karr AF, Marron JS, Siy H (2000) Predicting fault incidence using software change history. IEEE Trans Software Eng 26(7):653-661
-
(2000)
IEEE Trans Software Eng
, vol.26
, Issue.7
, pp. 653-661
-
-
Graves, T.L.1
Karr, A.F.2
Marron, J.S.3
Siy, H.4
-
11
-
-
16244370106
-
Robust prediction of fault-proneness by random forests
-
Saint-Malo, Bretagne, France
-
Guo L, Ma Y, Cukic B, Singh H (2004) Robust prediction of fault-proneness by random forests. In: the 15th International Symposium on Software Reliability Engineering (ISSRE'04), Saint-Malo, Bretagne, France, pp 417-428.
-
(2004)
The 15th International Symposium on Software Reliability Engineering (ISSRE'04)
, pp. 417-428
-
-
Guo, L.1
Ma, Y.2
Cukic, B.3
Singh, H.4
-
14
-
-
77957294705
-
IEEE Std 982.1-1988 IEEE standard dictionary of measures to produce reliable software
-
IEEE
-
IEEE (1988) IEEE Std 982.1-1988 IEEE standard dictionary of measures to produce reliable software. IEEE Computer Society.
-
(1988)
IEEE Computer Society
-
-
-
15
-
-
57349147671
-
Can data transformation help in the detection of fault-prone modules?
-
Seattle, Washington
-
Jiang Y, Cukic B, Menzies T (2008a) Can data transformation help in the detection of fault-prone modules? In: Proceedings of the 2008 Workshop on Defects in Large Software Systems (DEFECTS'08), Seattle, Washington, pp 16-20.
-
(2008)
Proceedings of the 2008 Workshop on Defects in Large Software Systems (DEFECTS'08)
, pp. 16-20
-
-
Jiang, Y.1
Cukic, B.2
Menzies, T.3
-
17
-
-
47949103719
-
The effects of over and under sampling on fault-prone module detection
-
20-21 Sept Madrid, Spain
-
Kamei Y, Monden A, Matsumoto S, Kakimoto T, Matsumoto K (20-21 Sept. 2007) The effects of over and under sampling on fault-prone module detection. In: 1st International Symposium on Empirical Software Engineering and Measurement, Madrid, Spain, pp 196-204.
-
(2007)
1st International Symposium on Empirical Software Engineering and Measurement
, pp. 196-204
-
-
Kamei, Y.1
Monden, A.2
Matsumoto, S.3
Kakimoto, T.4
Matsumoto, K.5
-
18
-
-
0029754927
-
Early quality prediction: A case study in telecommunications
-
10.1109/52.476287
-
Khoshgoftaar TM, Allen EB, Kalaichelvan KS, Goel N (1996) Early quality prediction: a case study in telecommunications. IEEE Software 13(1):65-71
-
(1996)
IEEE Software
, vol.13
, Issue.1
, pp. 65-71
-
-
Khoshgoftaar, T.M.1
Allen, E.B.2
Kalaichelvan, K.S.3
Goel, N.4
-
21
-
-
0004229237
-
-
PhD dissertation, Purdue University, West Lafayette
-
Krsul IV (1998) Software vulnerability analysis. PhD dissertation, Purdue University, West Lafayette.
-
(1998)
Software Vulnerability Analysis
-
-
Krsul, I.V.1
-
22
-
-
49349089233
-
Benchmarking classification models for software defect prediction: A proposed framework and novel findings
-
10.1109/TSE.2008.35
-
Lessmann S, Baesens B, Mues C, Pietsch S (2008) Benchmarking classification models for software defect prediction: a proposed framework and novel findings. IEEE Trans Software Eng 34(4):485-496
-
(2008)
IEEE Trans Software Eng
, vol.34
, Issue.4
, pp. 485-496
-
-
Lessmann, S.1
Baesens, B.2
Mues, C.3
Pietsch, S.4
-
23
-
-
0242410408
-
Benchmarking attribute selection techniques for discrete class data mining
-
Mark A. Hall, Holmes G (2003) Benchmarking attribute selection techniques for discrete class data mining. IEEE Trans Knowl Data Eng 15 (3).
-
(2003)
IEEE Trans Knowl Data Eng
, vol.15
, Issue.3
-
-
Hall, M.A.1
Holmes, G.2
-
24
-
-
0017291489
-
A complexity measure
-
445904 0352.68066 10.1109/TSE.1976.233837
-
McCabe TJ (1976) A complexity measure. IEEE Trans Software Eng 2(4):308-320
-
(1976)
IEEE Trans Software Eng
, vol.2
, Issue.4
, pp. 308-320
-
-
McCabe, T.J.1
-
26
-
-
74049133901
-
Secure open source collaboration: An empirical study of Linus' Law" computer and communications security
-
November Chicago, IL
-
Meneely A, Williams L (November 2009) Secure open source collaboration: an empirical study of Linus' Law" computer and communications security. In: Computer and Communications Security (CCS), Chicago, IL, pp 453-462.
-
(2009)
Computer and Communications Security (CCS)
, pp. 453-462
-
-
Meneely, A.1
Williams, L.2
-
27
-
-
34548245485
-
Problems with precision: A response to "comments on 'Data Mining Static Code Attributes to Learn Defect Predictors'
-
10.1109/TSE.2007.70721
-
Menzies T, Dekhtyar A, Distefano J, Greenwald J (2007a) Problems with precision: a response to "Comments on 'Data Mining Static Code Attributes to Learn Defect Predictors'". IEEE Trans Software Eng 33(9):637-640
-
(2007)
IEEE Trans Software Eng
, vol.33
, Issue.9
, pp. 637-640
-
-
Menzies, T.1
Dekhtyar, A.2
Distefano, J.3
Greenwald, J.4
-
28
-
-
33845782503
-
Data mining static code attributes to learn defect predictors
-
10.1109/TSE.2007.256941
-
Menzies T, Greenwald J, Frank A (2007b) Data mining static code attributes to learn defect predictors. IEEE Trans Software Eng 33(1):2-13
-
(2007)
IEEE Trans Software Eng
, vol.33
, Issue.1
, pp. 2-13
-
-
Menzies, T.1
Greenwald, J.2
Frank, A.3
-
29
-
-
77956972220
-
Defect prediction from static code feature: Current results, limitations, new approaches
-
101007/s10515-010-0069-5
-
Menzies T, Milton Z, Turhan B, Cukic B, Jiang Y, Bener A (2010) Defect prediction from static code feature: current results, limitations, new approaches. Autom Softw Eng 17(4):doi: 10.1007/s10515-010-0069-5
-
(2010)
Autom Softw Eng
, vol.17
, Issue.4
-
-
Menzies, T.1
Milton, Z.2
Turhan, B.3
Cukic, B.4
Jiang, Y.5
Bener, A.6
-
30
-
-
57049155106
-
Implications of ceiling effects in defect predictors
-
May Leipzig, Germany
-
Menzies T, Turhan B, Bener A, Gay G, Cukic B, Jiang Y (May 2008) Implications of ceiling effects in defect predictors. In: the 4th International Workshop on Predictor Models in Software Engineering (PROMISE''08), Leipzig, Germany, pp 47-54.
-
(2008)
The 4th International Workshop on Predictor Models in Software Engineering (PROMISE''08)
, pp. 47-54
-
-
Menzies, T.1
Turhan, B.2
Bener, A.3
Gay, G.4
Cukic, B.5
Jiang, Y.6
-
31
-
-
33244463047
-
Use of relative code churn measures to predict system defect density
-
May 15-21 St. Louis, MO, USA
-
Nagappan N, Ball T (May 15-21 2005) Use of relative code churn measures to predict system defect density. In: the 27th International Conference on Software Engineering, St. Louis, MO, USA, pp 284-292.
-
(2005)
The 27th International Conference on Software Engineering
, pp. 284-292
-
-
Nagappan, N.1
Ball, T.2
-
32
-
-
33749637286
-
Mining metrics to predict component failures
-
May 20-28 Shanghai, China
-
Nagappan N, Ball T, Zeller A (May 20-28 2006) Mining metrics to predict component failures. In: the 28th International Conference on Software Engineering, Shanghai, China, pp 452-461.
-
(2006)
The 28th International Conference on Software Engineering
, pp. 452-461
-
-
Nagappan, N.1
Ball, T.2
Zeller, A.3
-
33
-
-
67249126825
-
Predicting vulnerable software components
-
October 29-November 2 Alexandria, Virginia, USA
-
Neuhaus S, Zimmermann T, Zeller A (October 29-November 2 2007) Predicting vulnerable software components. In: the 14th ACM Conference on Computer and Communications Security (CCS'07), Alexandria, Virginia, USA, pp 529-540.
-
(2007)
The 14th ACM Conference on Computer and Communications Security (CCS'07)
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Zeller, A.3
-
34
-
-
0010361611
-
The economic impacts of inadequate infrastructure for software testing
-
NIST
-
NIST (2002) The economic impacts of inadequate infrastructure for software testing. National Institute of Standards & Technology.
-
(2002)
National Institute of Standards & Technology
-
-
-
35
-
-
22944473604
-
Predicting the location and number of faults in large software systems
-
10.1109/TSE.2005.49
-
Ostrand TJ, Weyuker EJ, Bell RM (2005) Predicting the location and number of faults in large software systems. IEEE Trans Software Eng 31(4):340-355
-
(2005)
IEEE Trans Software Eng
, vol.31
, Issue.4
, pp. 340-355
-
-
Ostrand, T.J.1
Weyuker, E.J.2
Bell, R.M.3
-
36
-
-
34548230444
-
Automating algorithms for the identification of fault-prone files
-
July 9-12 London, UK
-
Ostrand TJ, Weyuker EJ, Bell RM (July 9-12 2007) Automating algorithms for the identification of fault-prone files. In: the 2007 International Symposium on Software Testing and Analysis (ISSTA'07), London, UK, pp. 219-227.
-
(2007)
The 2007 International Symposium on Software Testing and Analysis (ISSTA'07)
, pp. 219-227
-
-
Ostrand, T.J.1
Weyuker, E.J.2
Bell, R.M.3
-
38
-
-
84948481845
-
An algorithm for suffix stripping
-
10.1108/eb046814
-
Porter MF (1980) An algorithm for suffix stripping. Program 16(3):130-137
-
(1980)
Program
, vol.16
, Issue.3
, pp. 130-137
-
-
Porter, M.F.1
-
39
-
-
84872330896
-
Geekonomics: The real cost of insecure software
-
Rice D (2007) Geekonomics: The real cost of insecure software. Addison-Wesley Professional
-
(2007)
Addison-Wesley Professional
-
-
Ice, D.1
-
40
-
-
70349263324
-
Is complexity really the enemy of software security?
-
Oct. 27 Alexandria, Virginia, USA
-
Shin Y, Williams L (Oct. 27 2008) Is complexity really the enemy of software security? In: the 4th ACM Workshop on Quality of Protection, Alexandria, Virginia, USA, pp. 47-50.
-
(2008)
The 4th ACM Workshop on Quality of Protection
, pp. 47-50
-
-
Shin, Y.1
Williams, L.2
-
41
-
-
83555172467
-
Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
-
Shin Y, Meneely A, Williams L (2011) Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities. IEEE Trans Software Eng.
-
(2011)
IEEE Trans Software Eng
-
-
Shin, Y.1
Meneely, A.2
Williams, L.3
-
44
-
-
77954485601
-
Searching for a needle in a haystack: Predicting security vulnerabilities for Windows Vista
-
Apr. 6-11 Paris, France
-
Zimmermann T, Nagappan N, Williams L (Apr. 6-11 2010) Searching for a needle in a haystack: predicting security vulnerabilities for Windows Vista. In: 3rd International Conference on Software Testing, Verification and Validation, Paris, France, pp. 421-428.
-
(2010)
3rd International Conference on Software Testing, Verification and Validation
, pp. 421-428
-
-
Zimmermann, T.1
Nagappan, N.2
Williams, L.3
|