Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study
暂无分享,去创建一个
Achim D. Brucker | Philip Miseldine | Eric Bodden | Lotfi Ben Othmane | Golriz Chehrazi | Petar Tsalovski | E. Bodden | L. B. Othmane | P. Miseldine | Golriz Chehrazi | Petar Tsalovski | L. Othmane
[1] S. A. Jacob,et al. Writing Interview Protocols and Conducting Interviews: Tips for Students New to the Field of Qualitative Research , 2012 .
[2] Christine Nadel,et al. Case Study Research Design And Methods , 2016 .
[3] Carolyn B. Seaman,et al. Qualitative Methods in Empirical Studies of Software Engineering , 1999, IEEE Trans. Software Eng..
[4] Claes Wohlin,et al. Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.
[5] Katerina Goseva-Popstojanova,et al. Software Faults Fixing Effort: Analysis and Prediction , 2014 .
[6] Laurie A. Williams,et al. Is complexity really the enemy of software security? , 2008, QoP '08.
[7] Johnny Saldaña,et al. The Coding Manual for Qualitative Researchers , 2009 .
[8] B SeamanCarolyn. Qualitative Methods in Empirical Studies of Software Engineering , 1999 .
[9] Achim D. Brucker,et al. Developing Secure Software A Holistic Approach to Security Testing Building secure software requires a well-selected combination of security testing techniques during the whole software development lifecycle. , 2014 .
[10] Achim D. Brucker,et al. Developing secure software , 2014, Datenschutz und Datensicherheit - DuD.
[11] Taghi M. Khoshgoftaar,et al. Early Quality Prediction: A Case Study in Telecommunications , 1996, IEEE Softw..
[12] Phongphun Kijsanayothin,et al. On modeling software defect repair time , 2009, Empirical Software Engineering.
[13] Gary McGraw,et al. Software Security: Building Security In , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[14] Michael Howard,et al. The security development lifecycle : SDL, a process for developing demonstrably more secure software , 2006 .
[15] Steve Lipner,et al. Security development lifecycle , 2010, Datenschutz und Datensicherheit - DuD.
[16] Mohammad Zulkernine,et al. Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities , 2011, J. Syst. Archit..
[17] Nouria Bricki,et al. A Guide to Using Qualitative Research Methodology , 2007 .
[18] Achim D. Brucker,et al. Deploying Static Application Security Testing on a Large Scale , 2014, Sicherheit.