Sciweavers

2236 search results - page 191 / 448
» Secure Software Design in Practice
Sort
View
97
Voted
WCRE
1999
IEEE
15 years 8 months ago
An Industrial Example of Database Reverse Engineering
This paper presents an industrial example of database reverse engineering. The example has been abridged so that it fits within a paper. Also some of the field names have been dis...
Michael R. Blaha
121
Voted
CSMR
2008
IEEE
15 years 10 months ago
Modularity-Oriented Refactoring
Refactoring, in spite of widely acknowledged as one of the best practices of object-oriented design and programming, still lacks quantitative grounds and efficient tools for tasks...
Sergio Bryton, Fernando Brito e Abreu
ICSE
2009
IEEE-ACM
15 years 10 months ago
Can peer code reviews be exploited for later information needs?
Code reviews have proven to be an effective means of improving overall software quality. During the review, there is an exchange of knowledge between the code author and reviewer ...
Andrew Sutherland, Gina Venolia
137
Voted
WCRE
2002
IEEE
15 years 8 months ago
Java Quality Assurance by Detecting Code Smells
Software inspection is a known technique for improving software quality. It involves carefully examining the code, the design, and the documentation of software and checking these...
Eva Van Emden, Leon Moonen
IFIP
2007
Springer
15 years 10 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...