-
2
-
-
26444516466
-
Security vulnerabilities in software systems: A quantitative perspective
-
Springer Verlag, Berlin, Heidelberg, August
-
Omar Alhazmi, Yashwant Malaiya, and Indrajit Ray. Security Vulnerabilities in Software Systems: A Quantitative Perspective, volume 3645/2005 of Lecture Notes in Computer Science, pages 281-294. Springer Verlag, Berlin, Heidelberg, August 2005.
-
(2005)
3645/2005 of Lecture Notes in Computer Science
, pp. 281-294
-
-
Alhazmi, O.1
Malaiya, Y.2
Ray, I.3
-
4
-
-
0033163749
-
Building knowledge through families of experiments
-
Victor R. Basili, Forrest Shull, and Filippo Lanubile. Building knowledge through families of experiments. IEEE Trans. Software Eng., 25(4):456-473, 1999.
-
(1999)
IEEE Trans. Software Eng.
, vol.25
, Issue.4
, pp. 456-473
-
-
Basili, V.R.1
Shull, F.2
Lanubile, F.3
-
5
-
-
85077039077
-
-
Last accessed: Aug. 2008
-
Ladislav Bodnar. Is RPM doomed? http://distrowatch.com/dwres.php?resource=article-rpm, 2002. Last accessed: Aug. 2008.
-
(2002)
Is RPM Doomed?
-
-
Bodnar, L.1
-
8
-
-
79959386955
-
-
Evgenia Dimitriadou, Kurt Hornik, Friedrich Leisch, David Meyer, and Andreas Weingessel. r-cran-e1071. http://mloss.org/software/view/94/, 2008.
-
(2008)
R-Cran-E1071
-
-
Dimitriadou, E.1
Hornik, K.2
Leisch, F.3
Meyer, D.4
Weingessel, A.5
-
9
-
-
85077046790
-
-
August
-
Free Software Foundation. DDD data display debugger. http://www.gnu.org/software/ddd/, August 2008.
-
(2008)
DDD Data Display Debugger
-
-
-
12
-
-
70349244714
-
Prioritizing software security fortification throughcode-level metrics
-
Michael Gegick, Laurie Williams, Jason Osborne, and Mladen Vouk. Prioritizing software security fortification throughcode-level metrics. In QoP '08: Proc. of the 4th ACM workshop on Quality of protection, pages 31-38. ACM, 2008.
-
(2008)
QoP '08: Proc. Of the 4th ACM Workshop on Quality of Protection
, pp. 31-38
-
-
Gegick, M.1
Williams, L.2
Osborne, J.3
Vouk, M.4
-
13
-
-
34548799736
-
Using software distributions to understand the relationship among free and open source software projects
-
Daniel M. Germán. Using software distributions to understand the relationship among free and open source software projects. In Proc. Int'l. Workshop on Mining Software Repositories (MSR), page 24, 2007.
-
(2007)
Proc. Int'L. Workshop on Mining Software Repositories (MSR)
, pp. 24
-
-
Germán, D.M.1
-
14
-
-
3242808612
-
-
Technical report, Computer Security Institute CSI
-
Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn, and Robert Richardson. CSI/FBI computer crime and security survey. Technical report, Computer Security Institute (CSI), 2005.
-
(2005)
CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
16
-
-
84864581418
-
-
Electrotechnical Commission. ISO/IEC 9899:TC3 committee draft. Technical report, Int'l. Organization for Standardization, September
-
Int'l. Organization for Standardization and Int'l. Electrotechnical Commission. ISO/IEC 9899:TC3 committee draft. Technical report, Int'l. Organization for Standardization, September 2007.
-
(2007)
Int'L. Organization for Standardization and Int'L
-
-
-
18
-
-
34547229642
-
Have things changed now? An empirical study of bug characteristics in modern open source software
-
October
-
Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou,, and Chengxiang Zhai. Have things changed now? an empirical study of bug characteristics in modern open source software. In Proc. Workshop on Architectural and System Support for Improving Software Dependability 2006, pages 25-33, October 2006.
-
(2006)
Proc. Workshop on Architectural and System Support for Improving Software Dependability 2006
, pp. 25-33
-
-
Li, Z.1
Tan, L.2
Wang, X.3
Lu, S.4
Zhou, Y.5
Zhai, C.6
-
22
-
-
58049099426
-
Mining metrics to predict component failures
-
New York, NY, USA, May ACM Press
-
Nachiappan Nagappan, Thomas Ball, and Andreas Zeller. Mining metrics to predict component failures. In Proc. 27th Int'l. Conf. on Software Engineering, New York, NY, USA, May 2005. ACM Press.
-
(2005)
Proc. 27th Int'L. Conf. On Software Engineering
-
-
Nagappan, N.1
Ball, T.2
Zeller, A.3
-
23
-
-
85077047474
-
-
September
-
National Institute of Standards. CVE 2007-5135. http://nvd.nist.gov/nvd.cfm?cvename= CVE-2007-5135, September 2007.
-
(2007)
CVE 2007-5135
-
-
-
25
-
-
67249126825
-
Predicting vulnerable software components
-
October
-
Stephan Neuhaus, Thomas Zimmermann, Christian Holler, and Andreas Zeller. Predicting vulnerable software components. In Proc. 14th ACM Conf. on Computer and Communications Security (CCS), pages 529-540, October 2007.
-
(2007)
Proc. 14th ACM Conf. On Computer and Communications Security (CCS)
, pp. 529-540
-
-
Neuhaus, S.1
Zimmermann, T.2
Holler, C.3
Zeller, A.4
-
28
-
-
84863304598
-
-
R Foundation for Statistical Computing, Vienna, Austria, ISBN
-
R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2008. ISBN 3-900051-07-0.
-
(2008)
R: A Language and Environment for Statistical Computing
-
-
-
29
-
-
85077034311
-
-
August
-
RedHat Network. Errata. https://rhn.redhat.com/errata/, August 2008.
-
(2008)
Errata
-
-
-
30
-
-
77953990481
-
Mining large software compilations over time: Another perspective of software evolution
-
Gregorio Robles, Jesús M. González-Barahona, Martin Michlmayr, and Juan Jose Amor. Mining large software compilations over time: another perspective of software evolution. In Proc. Workshop on Mining Software Repositories, pages 3-9, 2006.
-
(2006)
Proc. Workshop on Mining Software Repositories
, pp. 3-9
-
-
Robles, G.1
González-Barahona, J.M.2
Michlmayr, M.3
Amor, J.J.4
-
31
-
-
34247346109
-
Predicting component failures at design time
-
New York, NY, USA, September
-
Adrian Schröter, Thomas Zimmermann, and Andreas Zeller. Predicting component failures at design time. In Proc. 5th Int'l. Symposium on Empirical Software Engineering, pages 18-27, New York, NY, USA, September 2006.
-
(2006)
Proc. 5th Int'L. Symposium on Empirical Software Engineering
, pp. 18-27
-
-
Schröter, A.1
Zimmermann, T.2
Zeller, A.3
-
33
-
-
74049127460
-
-
Pearson Education, Inc., Boston, MA, USA
-
Adam Shostack and Andrew Stewart. The New School of Information Security. Pearson Education, Inc., Boston, MA, USA, 2008.
-
(2008)
The New School of Information Security
-
-
Shostack, A.1
Stewart, A.2
-
38
-
-
77952369900
-
On estimating the security risks of composite software services
-
June
-
Jian Yin, Chunqiang Tang, Xiaolan Zhang, and Michael McIntosh. On estimating the security risks of composite software services. In Proc. PASSWORD Workshop, June 2006.
-
(2006)
Proc. PASSWORD Workshop
-
-
Yin, J.1
Tang, C.2
Zhang, X.3
McIntosh, M.4
|