共 91 条
[1]
Ackerman A. F., 1984, Software Validation, Inspection - Testing - Verification - Alternatives. Proceedings of the Symposium, P13
[3]
Akinola O S., 2009, An Empirical Comparative Study of Checklist based and Ad Hoc Code Reading Techniques in a Distributed Groupware Environment
[4]
Alam M., 2010, INT J SOFTWARE ENG I, V3, P53
[5]
[Anonymous], 2017, OWASP Top Ten
[6]
[Anonymous], 2020, CWE TOP 25 MOST DANG
[7]
[Anonymous], 2020, 2020 Mapping the DevSecOps Landscape
[8]
[Anonymous], 2000, INTERNET SECURITY GL
[9]
Assal H, 2018, PROCEEDINGS OF THE FOURTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, P281
[10]
Ayewah N., 2008, DEFECTS 08, P1, DOI DOI 10.1145/1390817.1390819