共 30 条
- [1] [Anonymous], 1990, IEEE Standard 610.12-1990, P1, DOI DOI 10.1109/IEEESTD.1990.101064
- [3] Assal H., Security in the software development lifecycle
- [4] Byrne MD, 1997, COGNITIVE SCI, V21, P31, DOI 10.1016/S0364-0213(99)80018-4
- [5] Machine Learning Methods for Software Vulnerability Detection [J]. IWSPA '18: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, 2018, : 31 - 39
- [6] Fleiss JL, 2003, Wiley Series in Probability and Statistics, P1940, DOI [10.1002/0471445428, DOI 10.1002/0471445428]
- [7] Mapping Software Faults with Web Security Vulnerabilities [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 257 - +
- [9] Glaser B., 1967, DISCOV GROUNDED THEO, DOI DOI 10.4324/9780203793206
- [10] Huang AFQ, 2012, PROCEEDINGS 18TH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY & QUALITY IN DESIGN, P44