共 39 条
[1]
You Get Where You're Looking For The Impact of Information Sources on Code Security
[J].
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2016,
:289-305
[2]
Analysis of the Encoding Scheme for CS-ACELP Codec for Secured VoIP Communication
[J].
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1,
2009,
:287-+
[3]
Acharya M, 2009, LECT NOTES COMPUT SC, V5503, P370
[4]
Applying Mutation Analysis On Kernel Test Suites: An Experience Report
[J].
10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017,
2017,
:110-115
[5]
Amann S, 2018, IEEE T SOFTWARE ENG
[6]
Baudry B., 2006, 28th International Conference on Software Engineering Proceedings, P82, DOI 10.1145/1134285.1134299
[7]
Improving API Documentation Usability with Knowledge Pushing
[J].
2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS,
2009,
:320-330
[8]
Egele M, 2013, P 2013 ACM SIGSAC C, P73, DOI DOI 10.1145/2508859.2516693
[9]
Fahl Sascha, 2012, ACM CCS 12, P50
[10]
Georgiev Martin, 2012, Proceedings of the 2012 ACM conference on Computer and communications security - CCS'12, page, P38, DOI 10.1145/2382196.2382204