共 7 条
[1]
When Do Changes Induce Software Vulnerabilities?
[J].
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC),
2017,
:59-66
[2]
Meneely Andrew, 2013, 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), P65, DOI 10.1109/ESEM.2013.19
[3]
Neuhaus S, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P529
[4]
Nguyen V. H., 2010, P 6 INT WORKSHOP SEC, P1, DOI DOI 10.1145/1853919.1853923
[5]
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:426-437
[7]
Predicting Vulnerable Components: Software Metrics vs Text Mining
[J].
2014 IEEE 25TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE),
2014,
:23-33