A Unified Measurement Solution of Software Trustworthiness Based on Social-to-Software Framework
暂无分享,去创建一个
[1] George J. Schick,et al. An Analysis of Competing Software Reliability Models , 1978, IEEE Transactions on Software Engineering.
[2] Yuanyuan Zhou,et al. CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code , 2004, OSDI.
[3] Feng Xu,et al. Enhancing trustworthiness evaluation in internetware with similarity and non-negative constraints , 2013, Internetware.
[4] Xu Wang,et al. A Fuzzy-Based Method for Evaluating the Trustworthiness of Software Processes , 2010, ICSP.
[5] Jason Bennett Thatcher,et al. Trust in a specific technology: An investigation of its components and measures , 2011, TMIS.
[6] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[7] Ping Luo,et al. A Measurable SocialToTech Software Trust Framework , 2019 .
[8] Ping Luo,et al. Forecasting severity of software vulnerability using grey model GM(1,1) , 2015, 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference (IAEAC).
[9] Bertrand Meyer,et al. The grand challenge of trusted components , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[10] Hong-wei Tao,et al. Another Metric Model for Trustworthiness of Softwares Based on Partition , 2010 .
[11] Michael P. Wiper,et al. Software Reliability Modeling with Software Metrics Data via Gaussian Processes , 2013, IEEE Transactions on Software Engineering.
[12] Wang Yibo,et al. Impacts of permafrost changes on alpine ecosystem in Qinghai-Tibet Plateau , 2006 .
[13] Tang Yang-bin,et al. Trustworthiness of Internet-based software , 2006 .
[14] Xu Jing,et al. A Dependability Evaluation Model for Internetware Based on Bayesian Network , 2012 .
[15] Yixiang Chen,et al. A Metric Model for Trustworthiness of Softwares , 2009, 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology.
[16] Lu Gang. Verification Oriented Trustworthiness Evidence and Trustworthiness Evaluation of Software , 2010 .
[17] Peng Xin. Research on Software Trustworthiness Evaluation Model and Its Implementation , 2011 .
[18] Brent A. Scott,et al. Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. , 2007, The Journal of applied psychology.
[19] A. Immonen,et al. Trustworthiness Evaluation and Testing of Open Source Components , 2007 .
[20] Ping Luo,et al. Research of Trustworthy Software System in the Network , 2012, 2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming.
[21] Zhu Man. Approach for Evaluating the Trustworthiness of Service Agent , 2011 .
[22] Norman L. Chervany,et al. What Trust Means in E-Commerce Customer Relationships: An Interdisciplinary Conceptual Typology , 2001, Int. J. Electron. Commer..
[23] Wilhelm Hasselbring,et al. Trustworthy software systems: a discussion of basic concepts and terminology , 2006, SOEN.
[24] Klaus Pohl,et al. Trustworthiness Attributes and Metrics for Engineering Trusted Internet-Based Software Systems , 2013, CLOSER.
[25] Martin L. Shooman,et al. Probabilistic Models for Software reliability Prediction , 1972, Statistical Computer Performance Evaluation.
[26] Yang Fuqing. Thinking on the Development of Software Engineering Technology , 2005 .
[27] Liu Zeng-lian. Progress in software trustworthiness metrics models , 2010 .
[28] Ross J. Anderson,et al. Security in open versus closed systems - the dance of Boltzmann , 2002 .
[29] Shinji Kusumoto,et al. CCFinder: A Multilinguistic Token-Based Code Clone Detection System for Large Scale Source Code , 2002, IEEE Trans. Software Eng..
[30] Edward Amoroso,et al. A process-oriented methodology for assessing and improving software trustworthiness , 1994, CCS '94.
[31] Yang Fu. Thinking on the Development of Software Engineering Technology , 2005 .
[32] Wei Li,et al. Optimized statistical analysis of software trustworthiness attributes , 2012, Science China Information Sciences.
[33] Z. Jelinski,et al. Software reliability Research , 1972, Statistical Computer Performance Evaluation.
[34] Yafang Huang,et al. SSRGM: Software Strong Reliability Growth Model Based on Failure Loss , 2012, PAAP.
[35] Zhi Jin,et al. Approach for Evaluating the Trustworthiness of Service Agent: Approach for Evaluating the Trustworthiness of Service Agent , 2011 .
[36] Yixiang Chen,et al. A new metric model for trustworthiness of softwares , 2010, Telecommunication Systems.
[37] Amrit L. Goel,et al. Time-Dependent Error-Detection Rate Model for Software Reliability and Other Performance Measures , 1979, IEEE Transactions on Reliability.
[38] Omar H. Alhazmi,et al. Quantitative vulnerability assessment of systems software , 2005, Annual Reliability and Maintainability Symposium, 2005. Proceedings..
[39] Eric Rescorla,et al. Is finding security holes a good idea? , 2005, IEEE Security & Privacy.
[40] Xin Wu,et al. Quantitative Evaluation across Software Development Life Cycle Based on Evidence Theory , 2013, ICIC.
[41] Mao Xiaoguang. A Classification Model for Software Trustworthiness , 2010 .
[42] Witold Suryn,et al. Software Trustworthiness: Past, Present and Future , 2012, ISCTCS.
[43] F. Schneider. Trust in Cyberspace , 1998 .