Source Codes Classification Using a Modified Instruction Count Pass
暂无分享,去创建一个
[1] Wouter Joosen,et al. Predicting Vulnerable Software Components via Text Mining , 2014, IEEE Transactions on Software Engineering.
[2] Lerina Aversano,et al. Learning from bug-introducing changes to prevent fault prone code , 2007, IWPSE '07.
[3] Mohammad Zulkernine,et al. Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities , 2011, J. Syst. Archit..
[4] Laurie A. Williams,et al. Is complexity really the enemy of software security? , 2008, QoP '08.
[5] Osamu Mizuno,et al. Spam Filter Based Approach for Finding Fault-Prone Software Modules , 2007, Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007).
[6] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[7] George Cybenko,et al. Three tenets for secure cyber-physical system design and assessment , 2014, Defense + Security Symposium.