Visual analysis of code security
暂无分享,去创建一个
[1] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[2] Robert A. Martin,et al. The Case for Common Flaw Enumeration , 2005 .
[3] Felix C. Freiling,et al. Visual analysis of malware behavior using treemaps and thread graphs , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[4] Tom Lanning,et al. Parallel bargrams for consumer-based information exploration and choice , 2001, UIST '01.
[5] Lorie M. Liebrock,et al. Visualizing compiled executables for malware analysis , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[6] Ben Shneiderman,et al. Ordered and quantum treemaps: Making effective use of 2D space to display hierarchies , 2002, TOGS.
[7] Dawson R. Engler,et al. A few billion lines of code later , 2010, Commun. ACM.
[8] W. Douglas Maughan,et al. The need for a national cybersecurity research and development agenda , 2010, Commun. ACM.
[9] Ben Shneiderman,et al. The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.
[10] Scott P. Robertson,et al. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 1991 .
[11] Jeffrey Heer,et al. prefuse: a toolkit for interactive information visualization , 2005, CHI.
[12] Thomas McGibbon,et al. Software Security Assurance: A State-of-Art Report (SAR) , 2007 .