Sciweavers

1548 search results - page 89 / 310
» Estimating Software Vulnerabilities
Sort
View
ESEM
2007
ACM
15 years 1 months ago
An Approach to Outlier Detection of Software Measurement Data using the K-means Clustering Method
The quality of software measurement data affects the accuracy of project manager’s decision making using estimation or prediction models and the understanding of real project st...
Kyung-A Yoon, Oh-Sung Kwon, Doo-Hwan Bae
ICSE
1998
IEEE-ACM
15 years 3 months ago
Calibrating the COCOMO II Post-Architecture Model
The COCOMO II model was created to meet the need for a cost model that accounted for future software development practices. This resulted in the formulation of three submodels for...
Bradford Clark, Sunita Devnani-Chulani, Barry W. B...
ICSE
2008
IEEE-ACM
16 years 1 days ago
The effect of the number of inspectors on the defect estimates produced by capture-recapture models
Inspections can be made more cost-effective by using capturerecapture methods to estimate post-inspection defects. Previous capture-recapture studies of inspections used relativel...
Gursimran Singh Walia, Jeffrey C. Carver, Nachiapp...
MSWIM
2006
ACM
15 years 5 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
CCS
2006
ACM
15 years 3 months ago
Packet vaccine: black-box exploit detection and signature generation
In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by thi...
XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reit...