Strengthening the empirical analysis of the relationship between Linus' Law and software security
暂无分享,去创建一个
[1] Josef Kittler,et al. Locally linear discriminant analysis for multimodally distributed classes for face recognition with a single model image , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Fred P. Brooks,et al. The Mythical Man-Month , 1975, Reliable Software.
[3] Andreas Zeller,et al. Predicting vulnerable software components , 2007, CCS '07.
[4] Satoru Miyano,et al. A Structure Learning Algorithm for Inference of Gene Networks from Microarray Gene Expression Data Using Bayesian Networks , 2007, 2007 IEEE 7th International Symposium on BioInformatics and BioEngineering.
[5] M E J Newman,et al. Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.
[6] Norman F. Schneidewind,et al. Methodology For Validating Software Metrics , 1992, IEEE Trans. Software Eng..
[7] Jr. Frederick P. Brooks,et al. The mythical man-month (anniversary ed.) , 1995 .
[8] N. Nagappan,et al. Use of relative code churn measures to predict system defect density , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[9] Victor R. Basili,et al. The influence of organizational structure on software quality , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[10] Laurie A. Williams,et al. Predicting failures with developer networks and social network analysis , 2008, SIGSOFT '08/FSE-16.
[11] Gary McGraw,et al. Software Security: Building Security In , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[12] Premkumar T. Devanbu,et al. Latent social structure in open source projects , 2008, SIGSOFT '08/FSE-16.
[13] Chris Arney. Network Analysis: Methodological Foundations , 2012 .
[14] Laurie A. Williams,et al. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.
[15] Bart Jacobs,et al. Increased security through open source , 2007, Commun. ACM.
[16] Ulrik Brandes,et al. Network Analysis: Methodological Foundations (Lecture Notes in Computer Science) , 2005 .
[17] Ian Witten,et al. Data Mining , 2000 .
[18] Carl E. Landwehr,et al. Does Open Source Improve System Security? , 2001, IEEE Softw..
[19] Brendan Murphy,et al. Can developer-module networks predict failures? , 2008, SIGSOFT '08/FSE-16.
[20] Avinash C. Kak,et al. PCA versus LDA , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[21] D. Lee,et al. Failure prediction and diagnosis for satellite monitoring systems using Bayesian networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[22] Eric Lease Morgan,et al. Review of The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary by Eric S. Raymond, Sebastopol, Calif.: O'Reilly, 1999 , 2000 .
[23] Jesús M. González-Barahona,et al. Applying Social Network Analysis to the Information in CVS Repositories , 2004, MSR.
[24] Eric S. Raymond,et al. The cathedral and the bazaar - musings on Linux and Open Source by an accidental revolutionary , 2001 .
[25] Laurie A. Williams,et al. Secure open source collaboration: an empirical study of linus' law , 2009, CCS.