Evaluating and comparing complexity, coupling and a new proposed set of coupling metrics in cross-project vulnerability prediction
暂无分享,去创建一个
[1] Glenford J. Myers,et al. Composite/structured design , 1978 .
[2] Andreas Zeller,et al. Predicting vulnerable software components , 2007, CCS '07.
[3] Michael Gegick,et al. Prioritizing software security fortification throughcode-level metrics , 2008, QoP '08.
[4] Victor R. Basili,et al. A Validation of Object-Oriented Design Metrics as Quality Indicators , 1996, IEEE Trans. Software Eng..
[5] Andreas Zeller,et al. Mining metrics to predict component failures , 2006, ICSE.
[6] Laurie A. Williams,et al. An initial study on the use of execution complexity metrics as indicators of software vulnerabilities , 2011, SESS '11.
[7] Jian Pei,et al. Data Mining: Concepts and Techniques, 3rd edition , 2006 .
[8] Ashkan Sami,et al. A security test-bed for industrial control systems , 2014, MoSEMInA 2014.
[9] Wouter Joosen,et al. Predicting Vulnerable Software Components via Text Mining , 2014, IEEE Transactions on Software Engineering.
[10] Norman Fenton,et al. A Probabilistic Model for Software Defect Prediction , 2001 .
[11] Javam C. Machado,et al. The prediction of faulty classes using object-oriented design metrics , 2001, J. Syst. Softw..
[12] Lionel C. Briand,et al. Exploring the relationships between design measures and software quality in object-oriented systems , 2000, J. Syst. Softw..
[13] Viet Hung Nguyen,et al. Predicting vulnerable software components with dependency graphs , 2010, MetriSec '10.
[14] Mohammad Zulkernine,et al. Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities , 2011, J. Syst. Archit..
[15] Glenford J. Myers,et al. Composite Structure Design , 1978 .
[16] Riccardo Scandariato,et al. Predicting vulnerable classes in an Android application , 2012, MetriSec '12.
[17] Ayse Basar Bener,et al. On the relative value of cross-company and within-company data for defect prediction , 2009, Empirical Software Engineering.
[18] Laurie A. Williams,et al. Can traditional fault prediction models be used for vulnerability prediction? , 2011, Empirical Software Engineering.
[19] Laurie A. Williams,et al. Is complexity really the enemy of software security? , 2008, QoP '08.
[20] Wouter Joosen,et al. Software vulnerability prediction using text analysis techniques , 2012, MetriSec '12.
[21] David Lo,et al. Combining Software Metrics and Text Features for Vulnerable File Prediction , 2015, 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS).
[22] Michael Gegick,et al. Predicting Attack-prone Components , 2009, 2009 International Conference on Software Testing Verification and Validation.
[23] Anas N. Al-Rabadi,et al. A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .
[24] Michael Gegick,et al. Toward Non-security Failures as a Predictor of Security Faults and Failures , 2009, ESSoS.
[25] อนิรุธ สืบสิงห์,et al. Data Mining Practical Machine Learning Tools and Techniques , 2014 .
[26] Karim O. Elish,et al. Predicting defect-prone software modules using support vector machines , 2008, J. Syst. Softw..
[27] Eugene H. Spafford,et al. Software vulnerability analysis , 1998 .
[28] Laurie A. Williams,et al. On the value of static analysis for fault detection in software , 2006, IEEE Transactions on Software Engineering.
[29] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach , 1982 .
[30] Ian Witten,et al. Data Mining , 2000 .
[31] Norman E. Fenton,et al. Probabilistic Modelling for Software Quality Control , 2001, ECSQARU.
[32] Michelle Cartwright,et al. An Empirical Investigation of an Object-Oriented Software System , 2000, IEEE Trans. Software Eng..
[33] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[34] Tim Menzies,et al. Data Mining Static Code Attributes to Learn Defect Predictors , 2007, IEEE Transactions on Software Engineering.
[35] Ashkan Sami,et al. Using complexity metrics to improve software security , 2013 .
[36] Brian W. Cashell. The Economic Impact of Cyber-Attacks , 2004 .
[37] Laurie A. Williams,et al. An empirical model to predict security vulnerabilities using code complexity metrics , 2008, ESEM '08.
[38] Chris F. Kemerer,et al. A Metrics Suite for Object Oriented Design , 2015, IEEE Trans. Software Eng..
[39] Akif Günes Koru,et al. An empirical comparison and characterization of high defect and high complexity modules , 2003, J. Syst. Softw..
[40] Laurie A. Williams,et al. Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.
[41] William M. Evanco,et al. A composite complexity approach for software defect modelling , 1994, Software Quality Journal.
[42] Gary McGraw,et al. Software Security: Building Security In , 2006, 2006 17th International Symposium on Software Reliability Engineering.