Sciweavers

241 search results - page 5 / 49
» Predicting vulnerable software components
Sort
View
IEEEARES
2009
IEEE
15 years 6 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
ISESE
2006
IEEE
15 years 5 months ago
Predicting component failures at design time
How do design decisions impact the quality of the resulting software? In an empirical study of 52 ECLIPSE plug-ins, we found that the software design as well as past failure histo...
Adrian Schröter, Thomas Zimmermann, Andreas Z...
AIM
2002
14 years 11 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
100
Voted
CSMR
2003
IEEE
15 years 4 months ago
Supporting Evolution in Component-Based Development Using Component Libraries
Component-based software development (CBSD) is a very promising software engineering technique for improving reuse and maintenance. Nevertheless, there are still some difficultie...
Miro Casanova, Ragnhild Van Der Straeten, Viviane ...