Vulnerability Prediction Based on Weighted Software Network for Secure Software Building
暂无分享,去创建一个
Mohsen Guizani | Xiaojiang Du | Chun Shan | Hao Zhong | Shengjun Wei | Lin Ye | M. Guizani | Xiaojiang Du | Lin Ye | Chun Shan | Hao Zhong | Shengjun Wei
[1] Gary McGraw,et al. Building Secure Software : ソフトウェアセキュリティについて開発者が知っているべきこと , 2006 .
[2] Laurie A. Williams,et al. Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista , 2010, 2010 Third International Conference on Software Testing, Verification and Validation.
[3] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[4] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[5] Mohammad Zulkernine,et al. Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities , 2011, J. Syst. Archit..
[6] Wang Bei. Software Networks Nodes Impact Analysis of Complex Software Systems , 2013 .
[7] Laurie A. Williams,et al. An initial study on the use of execution complexity metrics as indicators of software vulnerabilities , 2011, SESS '11.
[8] R. Ferrer i Cancho,et al. Scale-free networks from optimal design , 2002, cond-mat/0204344.
[9] Yves Le Traon,et al. Vulnerability Prediction Models: A Case Study on the Linux Kernel , 2016, 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM).
[10] Laurie A. Williams,et al. Is complexity really the enemy of software security? , 2008, QoP '08.
[11] Riccardo Scandariato,et al. Predicting Vulnerable Components: Software Metrics vs Text Mining , 2014, 2014 IEEE 25th International Symposium on Software Reliability Engineering.
[12] Javam C. Machado,et al. The prediction of faulty classes using object-oriented design metrics , 2001, J. Syst. Softw..
[13] Laurie A. Williams,et al. An empirical model to predict security vulnerabilities using code complexity metrics , 2008, ESEM '08.
[14] Jie Wu,et al. Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms , 2016, IEEE Transactions on Vehicular Technology.
[15] Witold Pedrycz,et al. Practical assessment of the models for identification of defect-prone classes in object-oriented commercial systems using design metrics , 2003, J. Syst. Softw..
[16] Laurie A. Williams,et al. Challenges with applying vulnerability prediction models , 2015, HotSoS.
[17] Nachiappan Nagappan,et al. Predicting defects using network analysis on dependency graphs , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[18] Wouter Joosen,et al. Predicting Vulnerable Software Components via Text Mining , 2014, IEEE Transactions on Software Engineering.
[19] Laurie A. Williams,et al. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.
[20] Norman Fenton,et al. A Probabilistic Model for Software Defect Prediction , 2001 .
[21] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[22] Viet Hung Nguyen,et al. Predicting vulnerable software components with dependency graphs , 2010, MetriSec '10.
[23] Xiaojiang Du,et al. PIPAC: Patient infusion pattern based access control scheme for wireless insulin pump system , 2013, 2013 Proceedings IEEE INFOCOM.
[24] Laurie A. Williams,et al. Can traditional fault prediction models be used for vulnerability prediction? , 2011, Empirical Software Engineering.
[25] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[26] Andreas Zeller,et al. Predicting vulnerable software components , 2007, CCS '07.
[27] Mohsen Guizani,et al. A lightweight live memory forensic approach based on hardware virtualization , 2017, Information Sciences.