An Empirical Methodology to Evaluate Vulnerability Discovery Models
暂无分享,去创建一个
[1] Awad A. Younis,et al. Modeling Learningless Vulnerability Discovery using a Folded Distribution , 2011 .
[2] Ross J. Anderson,et al. Security in open versus closed systems - the dance of Boltzmann , 2002 .
[3] Fabio Massacci,et al. Which is the right source for vulnerability studies?: an empirical analysis on Mozilla Firefox , 2010, MetriSec '10.
[4] Fabio Massacci,et al. The (un)reliability of NVD vulnerable versions data: an empirical experiment on Google Chrome vulnerabilities , 2013, ASIA CCS '13.
[5] Andreas Zeller,et al. Predicting vulnerable software components , 2007, CCS '07.
[6] N. Nagappan,et al. Use of relative code churn measures to predict system defect density , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[7] H. Akaike. Prediction and Entropy , 1985 .
[8] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[9] Letha H. Etzkorn,et al. Empirical Validation of Three Software Metrics Suites to Predict Fault-Proneness of Object-Oriented Classes Developed Using Highly Iterative or Agile Software Development Processes , 2007, IEEE Transactions on Software Engineering.
[10] Carleen Maitland,et al. Trust in cyberspace , 2000 .
[11] Yashwant K. Malaiya,et al. Predictability of software-reliability models , 1992 .
[12] P. C. Jha,et al. Software Reliability Growth Models , 2011 .
[13] Y.K. Malaiya,et al. Prediction capabilities of vulnerability discovery models , 2006, RAMS '06. Annual Reliability and Maintainability Symposium, 2006..
[14] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[15] Andy Ozment,et al. Improving Vulnerability Discovery Models Problems with De fi nitions and Assumptions , 2007 .
[16] Indrajit Ray,et al. Measuring, analyzing and predicting security vulnerabilities in software systems , 2007, Comput. Secur..
[17] Indrakshi Ray,et al. Vulnerability Discovery in Multi-Version Software Systems , 2007, 10th IEEE High Assurance Systems Engineering Symposium (HASE'07).
[18] Yashwant K. Malaiya,et al. Vulnerability Discovery Modeling Using Weibull Distribution , 2008, 2008 19th International Symposium on Software Reliability Engineering (ISSRE).
[19] Mohammad Zulkernine,et al. Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities , 2011, J. Syst. Archit..
[20] Viet Hung Nguyen,et al. Predicting vulnerable software components with dependency graphs , 2010, MetriSec '10.
[21] Yashwant K. Malaiya,et al. Application of Vulnerability Discovery Models to Major Operating Systems , 2008, IEEE Transactions on Reliability.
[22] Amrit L. Goel,et al. Time-Dependent Error-Detection Rate Model for Software Reliability and Other Performance Measures , 1979, IEEE Transactions on Reliability.
[23] William A. Arbaugh,et al. IEEE 52 Computer , 1985 .
[24] Yashwant K. Malaiya,et al. Modeling the vulnerability discovery process , 2005, 16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05).
[25] R Core Team,et al. R: A language and environment for statistical computing. , 2014 .
[26] Yashwant K. Malaiya,et al. Modeling vulnerability discovery process in Apache and IIS HTTP servers , 2011, Comput. Secur..
[27] Bijamma Thomas,et al. Software reliability growth models , 2014 .
[28] Yashwant K. Malaiya,et al. Assessing Vulnerabilities in Apache and IIS HTTP Servers , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[29] Philip J. Fleming,et al. How not to lie with statistics: the correct way to summarize benchmark results , 1986, CACM.
[30] Guido Schryen,et al. Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities , 2009, AMCIS.
[31] Michael Gegick,et al. Toward Non-security Failures as a Predictor of Security Faults and Failures , 2009, ESSoS.
[32] Steve McKillup,et al. Statistics Explained: An Introductory Guide for Life Scientists , 2006 .
[33] Yashwant K. Malaiya,et al. Measuring and Enhancing Prediction Capabilities of Vulnerability Discovery Models for Apache and IIS HTTP Servers , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[34] Andreas Zeller,et al. When do changes induce fixes? , 2005, ACM SIGSOFT Softw. Eng. Notes.
[35] Fabio Massacci,et al. After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes , 2011, ESSoS.
[36] Michael Gegick. Failure-prone components are also attack-prone components , 2008, OOPSLA Companion.
[37] Eric Rescorla,et al. Is finding security holes a good idea? , 2005, IEEE Security & Privacy.
[38] Indrajit Ray,et al. Security Vulnerabilities in Software Systems: A Quantitative Perspective , 2005, DBSec.
[39] Laurie A. Williams,et al. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.
[40] Shigeru Yamada,et al. S-Shaped Reliability Growth Modeling for Software Error Detection , 1983, IEEE Transactions on Reliability.
[41] Stuart E. Schechter,et al. Milk or Wine: Does Software Security Improve with Age? , 2006, USENIX Security Symposium.
[42] Nachiappan Nagappan,et al. Predicting Subsystem Defects using Dependency Graph Complexities , 2007 .
[43] Yashwant K. Malaiya,et al. AN ANALYSIS OF THE VULNERABILITY DISCOVERY PROCESS IN WEB BROWSERS , 2006 .