Sciweavers

1548 search results - page 146 / 310
» Estimating Software Vulnerabilities
Sort
View
ACSAC
2001
IEEE
15 years 3 months ago
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
Valentin Razmov, Daniel R. Simon
90
Voted
DIMVA
2008
15 years 22 days ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
138
Voted
SIGSOFT
2010
ACM
14 years 6 months ago
Evolution of a bluetooth test application product line: a case study
In this paper, we study the decision making process involved in the five year lifecycle of a Bluetooth software product produced by a large, multi-national test and measurement fi...
Narayan Ramasubbu, Rajesh Krishna Balan
ICSE
2000
IEEE-ACM
15 years 3 months ago
Software metrics: roadmap
Software metrics as a subject area is over 30 years old, but it has barely penetrated into mainstream software engineering. A key reason for this is that most software metrics act...
Norman E. Fenton, Martin Neil
ENGL
2007
100views more  ENGL 2007»
14 years 11 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin