Sciweavers

1548 search results - page 38 / 310
» Estimating Software Vulnerabilities
Sort
View
96
Voted
CCS
2010
ACM
14 years 11 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
ESEM
2007
ACM
15 years 3 months ago
Cognitive Limits of Software Cost Estimation
This paper explores the cognitive limits of estimation in the context of software cost estimation. Two heuristics, representativeness and anchoring, motivate two experiments invol...
Ricardo Valerdi
MKWI
2008
168views Business» more  MKWI 2008»
15 years 16 days ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
SETP
2008
15 years 16 days ago
Parametric Software Cost Estimation for the Solitary Programmer
Software cost estimation is known to be a challenging task at best, and these challenges are increased for programmers operating outside the support of an established team program...
Royce Nobles, Devon Simmonds, Gene Tagliarini
COMPSAC
1999
IEEE
15 years 3 months ago
A Framework for Top-Down Cost Estimation of Software Development
The Function Point Method, estimation by analogy, and algorithmic modeling are three of the most commonly applied methods used to estimate the costs and worker hours neededfor a s...
Tsuneo Yamaura, Tohru Kikuno