A Coverage and Slicing Dependencies Analysis for Seeking Software Security Defects
暂无分享,去创建一个
[1] M. Ben Swarup,et al. A Software Safety Model for Safety Critical Applications , 2009 .
[2] T. H. Tse,et al. Capturing propagation of infected program states , 2009, ESEC/FSE '09.
[3] Hui He,et al. PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform , 2014, Int. J. Distributed Sens. Networks.
[4] Ccf Key. Test-Data Generation Guided by Static Defect Detection , 2009 .
[5] Tai-hoon Kim,et al. Application of Genetic Algorithm in Software Testing , 2009 .
[6] Li Chao. Survey of software assurance , 2009 .
[7] Mary Jean Harrold,et al. An empirical study of the effects of test-suite reduction on fault localization , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[8] Tai-hoon Kim,et al. Secure Encapsulation and Publication of Biological Services in the Cloud Computing Environment , 2013, BioMed research international.
[9] Trishul M. Chilimbi,et al. HOLMES: Effective statistical debugging via efficient path profiling , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[10] Mokhtar Beldjehem,et al. A Unified Granular Fuzzy-Neuro Framework for Predicting and Understanding Software Quality , 2010 .