-
3
-
-
71649110371
-
A systematic and comprehensive investigation of methods to build and evaluate fault prediction models
-
E. Arisholm, L.C. Briand, and E.B. Johannessen A systematic and comprehensive investigation of methods to build and evaluate fault prediction models Journal of Systems and Software 83 1 2010 2 17
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.1
, pp. 2-17
-
-
Arisholm, E.1
Briand, L.C.2
Johannessen, E.B.3
-
4
-
-
84880834095
-
-
BugTraq. (accessed March 2011)
-
BugTraq. < http://www.securityfocus.com/archive/1 > (accessed March 2011).
-
-
-
-
5
-
-
29644438050
-
Statistical comparisons of classifiers over multiple data sets
-
J. Demšar Statistical comparisons of classifiers over multiple data sets Journal of Machine Learning Research 7 2006 1 30 (Pubitemid 43022939)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 1-30
-
-
Demsar, J.1
-
6
-
-
68349098892
-
Performance of five two-sample location tests for skewed distributions with unequal variances
-
M.W. Fagerland, and L. Sandvik Performance of five two-sample location tests for skewed distributions with unequal variances Contemporary Clinical Trials 30 5 2009 490 496
-
(2009)
Contemporary Clinical Trials
, vol.30
, Issue.5
, pp. 490-496
-
-
Fagerland, M.W.1
Sandvik, L.2
-
8
-
-
85152529520
-
Ordering effects in clustering
-
Aberdeen, Scotland
-
D. Fisher, L. Xu, N. Zard, Ordering effects in clustering, in: Proceedings of the 9th International Workshop on Machine Learning, Aberdeen, Scotland, 1992, pp. 163-168.
-
(1992)
Proceedings of the 9th International Workshop on Machine Learning
, pp. 163-168
-
-
Fisher, D.1
Xu, L.2
Zard, N.3
-
9
-
-
85013748296
-
-
Syngress
-
S. Fogie, J. Grossman, R. Hansen, A. Rager, XSS Exploits: Cross Site Scripting Attacks and Defense, Syngress, 2007, pp. 395-406.
-
(2007)
XSS Exploits: Cross Site Scripting Attacks and Defense
, pp. 395-406
-
-
Fogie, S.1
Grossman, J.2
Hansen, R.3
Rager, A.4
-
10
-
-
79952838952
-
Choosing software metrics for defect prediction: An investigation on feature selection techniques
-
K. Gao, T.M. Khoshgoftaar, H. Wang, and N. Seliya Choosing software metrics for defect prediction: an investigation on feature selection techniques Software Practice and Experience 41 5 2011 579 606
-
(2011)
Software Practice and Experience
, vol.41
, Issue.5
, pp. 579-606
-
-
Gao, K.1
Khoshgoftaar, T.M.2
Wang, H.3
Seliya, N.4
-
11
-
-
70349244714
-
Prioritizing software security fortification through code-level metrics
-
Alexandria, Virginia
-
M. Gegick, L. Williams, J. Osborne, M. Vouk, Prioritizing software security fortification through code-level metrics, in: Proceedings of the 4th ACM Workshop on Quality of Protection, Alexandria, Virginia, 2008, pp. 31-38.
-
(2008)
Proceedings of the 4th ACM Workshop on Quality of Protection
, pp. 31-38
-
-
Gegick, M.1
Williams, L.2
Osborne, J.3
Vouk, M.4
-
13
-
-
33751027156
-
Pixy: A static analysis tool for detecting web application vulnerabilities (Short paper)
-
DOI 10.1109/SP.2006.29, 1624016, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
N. Jovanovic, C. Kruegel, E. Kirda, Pixy: a static analysis tool for detecting web application vulnerabilities, in: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, 2006, pp. 258-263. (Pubitemid 44753727)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 258-263
-
-
Jovanovic, N.1
Kruegel, C.2
Kirda, E.3
-
14
-
-
85008256304
-
HAMPI: A solver for string constraints
-
Chicago, IL
-
A. Kiezun, V. Ganesh, P.J. Guo, P. Hooimeijer, M.D. Ernst, HAMPI: a solver for string constraints, in: Proceedings of the 18th International Symposium on Testing and Analysis, Chicago, IL, 2009, pp. 105-116.
-
(2009)
Proceedings of the 18th International Symposium on Testing and Analysis
, pp. 105-116
-
-
Kiezun, A.1
-
15
-
-
77949879017
-
Automatic creation of SQL injection and cross-site scripting attacks
-
Vancouver, BC
-
A. Kiezun, P.J. Guo, K. Jayaraman, M.D. Ernst, Automatic creation of SQL injection and cross-site scripting attacks, in: Proceedings of the 31st International Conference on Software Engineering, Vancouver, BC, 2009, pp. 199-209.
-
(2009)
Proceedings of the 31st International Conference on Software Engineering
, pp. 199-209
-
-
Kiezun, A.1
-
16
-
-
49349089233
-
Benchmarking classification models for software defect prediction: A proposed framework and novel findings
-
S. Lessmann, B. Baesens, C. Mues, and S. Pietsch Benchmarking classification models for software defect prediction: a proposed framework and novel findings IEEE Transactions on Software Engineering 34 4 2008 485 496
-
(2008)
IEEE Transactions on Software Engineering
, vol.34
, Issue.4
, pp. 485-496
-
-
Lessmann, S.1
Baesens, B.2
Mues, C.3
Pietsch, S.4
-
17
-
-
84923564816
-
Finding security errors in Java programs with static analysis
-
Baltimore, MD
-
V.B. Livshits, M.S. Lam, Finding security errors in Java programs with static analysis, in: Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, 2005, pp. 271-286.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
, pp. 271-286
-
-
Livshits, V.B.1
Lam, M.S.2
-
18
-
-
85084163766
-
Automatic generation of XSS and SQL injection attacks with goal-directed model checking
-
San Jose, CA
-
M. Martin, M.S. Lam, Automatic generation of XSS and SQL injection attacks with goal-directed model checking, in: Proceedings of the 17th USENIX Security Symposium, San Jose, CA, 2008, pp. 31-43.
-
(2008)
Proceedings of the 17th USENIX Security Symposium
, pp. 31-43
-
-
Martin, M.1
Lam, M.S.2
-
20
-
-
78649770544
-
Replication of defect prediction studies: Problems, pitfalls and recommendations
-
Timisoara, Romania
-
T. Mende, Replication of defect prediction studies: problems, pitfalls and recommendations, in: Proceedings of the 5th International Conference on Predictor Models in Software Engineering, Timisoara, Romania, 2010, pp. 1-10.
-
(2010)
Proceedings of the 5th International Conference on Predictor Models in Software Engineering
, pp. 1-10
-
-
Mende, T.1
-
21
-
-
33845782503
-
Data mining static code attributes to learn defect predictors
-
DOI 10.1109/TSE.2007.256941
-
T. Menzies, J. Greenwald, and A. Frank Data mining static code attributes to learn defect predictors IEEE Transactions on Software Engineering 33 1 2007 2 13 (Pubitemid 46002165)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.1
, pp. 2-13
-
-
Menzies, T.1
Greenwald, J.2
Frank, A.3
-
22
-
-
77956972220
-
Defect prediction from static code features: Current results, limitations, new approaches
-
T. Menzies, Z. Milton, B. Turhan, B. Cukic, Y. Jiang, and A. Bener Defect prediction from static code features: current results, limitations, new approaches Automated Software Engineering 17 4 2010 375 407
-
(2010)
Automated Software Engineering
, vol.17
, Issue.4
, pp. 375-407
-
-
Menzies, T.1
Milton, Z.2
Turhan, B.3
Cukic, B.4
Jiang, Y.5
Bener, A.6
-
23
-
-
57049155106
-
Implications of ceiling effects in defect predictors
-
Leipzig, Germany
-
T. Menzies, B. Turhan, A. Bener, G. Gay, B. Cukic, Y. Jiang, Implications of ceiling effects in defect predictors, in: Promise Workshop (Part of the 30th International Conference on Software Engineering), Leipzig, Germany, 2008, pp. 47-54.
-
(2008)
Promise Workshop (Part of the 30th International Conference on Software Engineering)
, pp. 47-54
-
-
Menzies, T.1
Turhan, B.2
Bener, A.3
Gay, G.4
Cukic, B.5
Jiang, Y.6
-
24
-
-
67249126825
-
Predicting vulnerable software components
-
Alexandria, Virginia
-
S. Neuhaus, T. Zimmermann, A. Zeller, Predicting vulnerable software components, in: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia, 2007, pp. 529-540.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Zeller, A.3
-
25
-
-
84880850922
-
-
OWASP (accessed January 2012)
-
OWASP. Top Ten Project 2010. < http://www.owasp.org > (accessed January 2012).
-
Top Ten Project 2010
-
-
-
26
-
-
84880850404
-
-
PhpMinerI
-
PhpMinerI. < http://sharlwinkhin.com/phpminer.html >.
-
-
-
-
27
-
-
84906049828
-
-
PROMISE (accessed November 2011)
-
PROMISE. Software Engineering Repository. < http://promise.site. uottawa.ca/SERepository/ > (accessed November 2011).
-
Software Engineering Repository
-
-
-
30
-
-
84855479474
-
Automated removal of cross site scripting vulnerabilities in web applications
-
L.K. Shar, and H.B.K. Tan Automated removal of cross site scripting vulnerabilities in web applications Information and Software Technology 54 5 2012 467 478
-
(2012)
Information and Software Technology
, vol.54
, Issue.5
, pp. 467-478
-
-
Shar, L.K.1
Tan, H.B.K.2
-
31
-
-
84864239564
-
Mining input sanitization patterns for predicting SQLI and XSS vulnerabilities
-
Zurich, Switzerland
-
L.K. Shar, H.B.K. Tan, Mining input sanitization patterns for predicting SQLI and XSS vulnerabilities, in: Proceedings of the 34th International Conference on Software Engineering, Zurich, Switzerland, 2012, pp. 1293-1296.
-
(2012)
Proceedings of the 34th International Conference on Software Engineering
, pp. 1293-1296
-
-
Shar, L.K.1
Tan, H.B.K.2
-
32
-
-
84886430853
-
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
-
San Francisco, USA, in press
-
L.K. Shar, H.B.K. Tan, L.C. Briand, Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis, in: Proceedings of the 35th International Conference on Software Engineering, San Francisco, USA, in press.
-
Proceedings of the 35th International Conference on Software Engineering
-
-
Shar, L.K.1
Tan, H.B.K.2
Briand, L.C.3
-
33
-
-
83555172467
-
Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
-
Y. Shin, A. Meneely, L. Williams, and J.A. Osborne Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities IEEE Transactions on Software Engineering 37 6 2011 772 787
-
(2011)
IEEE Transactions on Software Engineering
, vol.37
, Issue.6
, pp. 772-787
-
-
Shin, Y.1
Meneely, A.2
Williams, L.3
Osborne, J.A.4
-
34
-
-
27644501818
-
A survey of controlled experiments in software engineering
-
DOI 10.1109/TSE.2005.97
-
D.I.K. Sjøberg, J.E. Hannay, O. Hansen, V.B. Kampenes, A. Karahasanović, N.-K. Liborg, and A.C. Rekdal A survey of controlled experiments in software engineering IEEE Transactions on Software Engineering 31 9 2005 733 753 (Pubitemid 41555415)
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, Issue.9
, pp. 733-753
-
-
Sjoberg, D.I.K.1
Hannay, J.E.2
Hansen, O.3
Kampenes, V.B.4
Karahasanovic, A.5
Liborg, N.-K.6
Rekdal, A.C.7
-
35
-
-
79957799751
-
A general software defect-proneness prediction framework
-
Q. Song, Z. Jia, M. Shepperd, S. Ying, and J. Liu A general software defect-proneness prediction framework IEEE Transactions on Software Engineering 37 3 2011 356 370
-
(2011)
IEEE Transactions on Software Engineering
, vol.37
, Issue.3
, pp. 356-370
-
-
Song, Q.1
Jia, Z.2
Shepperd, M.3
Ying, S.4
Liu, J.5
-
37
-
-
84880831784
-
-
(accessed March 2011)
-
Sourceforge. < http://www.sourceforge.net > (accessed March 2011).
-
-
-
-
38
-
-
57849137358
-
On automated prepared statement generation to remove SQL injection vulnerabilities
-
S. Thomas, L. Williams, and T. Xie On automated prepared statement generation to remove SQL injection vulnerabilities Information and Software Technology 51 3 2009 589 598
-
(2009)
Information and Software Technology
, vol.51
, Issue.3
, pp. 589-598
-
-
Thomas, S.1
Williams, L.2
Xie, T.3
-
40
-
-
77953772736
-
Validation of network measures as indicators of defective modules in software systems
-
Vancouver, BC
-
A. Tosun, B. Turhan, A. Bener, Validation of network measures as indicators of defective modules in software systems, in: Proceedings of the 5th International Conference on Predictor Models in Software Engineering, Vancouver, BC, 2009, pp. 1-9.
-
(2009)
Proceedings of the 5th International Conference on Predictor Models in Software Engineering
, pp. 1-9
-
-
Tosun, A.1
Turhan, B.2
Bener, A.3
-
41
-
-
72449154095
-
Security of open source web applications
-
Lake Buena Vista, Florida
-
J. Walden, M. Doyle, G.A. Welch, M. Whelan, Security of open source web applications, in: Proceedings of the 3rd International Symposium on Empirical Software Engineering and Measurement, Lake Buena Vista, Florida, 2009, pp. 545-553.
-
(2009)
Proceedings of the 3rd International Symposium on Empirical Software Engineering and Measurement
, pp. 545-553
-
-
Walden, J.1
Doyle, M.2
Welch, G.A.3
Whelan, M.4
-
42
-
-
57449103850
-
Dynamic test input generation for web applications
-
Seattle, WA
-
G. Wassermann, D. Yu, A. Chander, D. Dhurjati, H. Inamura, Z. Su, Dynamic test input generation for web applications, in: Proceedings of the International Symposium on Software Testing and Analysis, Seattle, WA, 2008, pp. 249-260.
-
(2008)
Proceedings of the International Symposium on Software Testing and Analysis
, pp. 249-260
-
-
Wassermann, G.1
Yu, D.2
Chander, A.3
Dhurjati, D.4
Inamura, H.5
Su, Z.6
-
44
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Vancouver, BC
-
Y. Xie, A. Aiken, Static detection of security vulnerabilities in scripting languages, in: Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, 2006, pp. 179-192.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 179-192
-
-
Xie, Y.1
Aiken, A.2
-
45
-
-
57349095431
-
Predicting defect using network analysis on dependency graphs
-
Leipzig, Germany
-
T. Zimmermann, N. Nagappan, Predicting defect using network analysis on dependency graphs, in: Proceedings of the 30th International Conference on Software Engineering, Leipzig, Germany, 2008, pp. 531-540.
-
(2008)
Proceedings of the 30th International Conference on Software Engineering
, pp. 531-540
-
-
Zimmermann, T.1
Nagappan, N.2
|