共 34 条
- [1] Ami AS, 2023, Arxiv, DOI arXiv:2307.16325
- [2] [Anonymous], 2023, CWE Top 25 Most Dangerous Software Weaknesses
- [3] [Anonymous], 2019, ISO/IEC TR 24772-1:2019
- [4] [Anonymous], 2019, ISO/IEC 64223-4-2:2019-12
- [5] [Anonymous], 2017, ISO/IEC 20246:2017
- [6] [Anonymous], 2018, ISO/IEC 64223-4-1:2018-1
- [7] Baskerville RL, 1996, J INFORM TECHNOL, V11, P235, DOI 10.1080/026839696345289
- [8] Characteristics of Useful Code Reviews: An Empirical Study at Microsoft [J]. 12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), 2015, : 146 - 156
- [9] Software Security during Modern Code Review: The Developer's Perspective [J]. PROCEEDINGS OF THE 30TH ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2022, 2022, : 810 - 821
- [10] Brooks C., 2023, Cybersecurity trends and statistics