Object Oriented Software Security in Design Phase
暂无分享,去创建一个
[1] Juyang Weng,et al. State-based SHOSLIF for indoor visual navigation , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).
[2] Barry Boehm,et al. Top 10 list [software development] , 2001 .
[3] A. Opdahl,et al. A Reuse-Based Approach to Determining Secur ity Requirements , 2003 .
[4] B. Boehm. Defect Reduction Top 10 List , 2001 .
[5] Mohammad Ubaidullah Bokhari,et al. Metrics for Requirements Engineering and Automated Requirements Tools , 2011 .
[6] Andreas L. Opdahl,et al. Eliciting security requirements with misuse cases , 2004, Requirements Engineering.
[7] Issam Dagher,et al. Face recognition using IPCA-ICA algorithm , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Hiroshi Murase,et al. Learning and recognition of 3D objects from appearance , 1993, [1993] Proceedings IEEE Workshop on Qualitative Vision.
[9] Mohammad Ubaidullah Bokhari,et al. A Comparative Study of Software Requirements Tools for Secure Software Development , 2009 .
[10] Paul Clements,et al. Software Architecture in Practice (Second Edition) , 2011 .
[11] Jan Jürjens. Using UMLsec and goal trees for secure systems development , 2002, SAC '02.
[12] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[13] Brian Henderson-Sellers,et al. Object-Oriented Metrics , 1993, TOOLS.
[14] Baowen Xu,et al. Software maintainability improvement: integrating standards and models , 2002, Proceedings 26th Annual International Computer Software and Applications.
[15] Hiroshi Murase,et al. Visual learning and recognition of 3-d objects from appearance , 2005, International Journal of Computer Vision.
[16] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[17] FrazerKen. Building secure software , 2002 .
[18] Gerrit Muller. How to Create an Architecture Overview , 2013 .
[19] Premkumar T. Devanbu,et al. Software engineering for security: a roadmap , 2000, ICSE '00.
[20] Yuntao Cui,et al. Appearance-Based Hand Sign Recognition from Intensity Image Sequences , 2000, Comput. Vis. Image Underst..
[21] Stephen H. Kan,et al. Metrics and Models in Software Quality Engineering , 1994, SOEN.
[22] Murugiah P. Souppaya,et al. Guideline on Network Security Testing , 2003 .
[23] Paul Clements,et al. Software architecture in practice , 1999, SEI series in software engineering.