共 66 条
[1]
Al Mamun M.A., 2010, 3 SWEDISH WORKSHOP M
[2]
SATT: Tailoring Code Metric Thresholds for Different Software Architectures
[J].
2016 IEEE 16TH INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM),
2016,
:41-50
[3]
[Anonymous], 2010, P INT S SOFTW TEST A, DOI DOI 10.1145/1831708.1831738
[4]
[Anonymous], 2000, Experimentation in Software Engineering
[5]
Antoine J.-Y., 2014, 14 C EUR CHAPT ASS C, P550
[6]
Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services
[J].
IEEE 15TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS,
2009,
:301-306
[9]
Analyzing the State of Static Analysis: A Large-Scale Evaluation in Open Source Software
[J].
2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1,
2016,
:470-481
[10]
State of the Systems Security
[J].
PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION,
2018,
:550-551