Tài liệu tham khảo |
Loại |
Chi tiết |
[1] ISO/IEC, "Information technology -- Security techniques -- Information security risk management," ISO/IEC FIDIS 27005:2008 , IT Sercurity 2011 |
Sách, tạp chí |
Tiêu đề: |
Information technology -- Security techniques -- Information security risk management |
|
[5] Sokratis Katsikas, Information Systems Security: Facing the information society of the 21st century. London |
Sách, tạp chí |
Tiêu đề: |
Information Systems Security: Facing the information society of the 21st century |
|
[7] Y. Shin, A. Meneely, L. Williams, and J. A. Osborne, "Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities," IEEE Transactions on Software Engineering, vol. 37, no. 6, pp. 772-787, Nov-Dec 2011 |
Sách, tạp chí |
Tiêu đề: |
Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities |
|
[8] Y. Shin and L. Williams, "Can traditional fault prediction models be used for vulnerability prediction?," vol. 18, no. 1, pp. 25-29, Feb 2013 |
Sách, tạp chí |
Tiêu đề: |
Can traditional fault prediction models be used for vulnerability prediction |
|
[9] Y. Shin and L. Williams, "Is complexity really the enemy of software security?," in The 4th ACM workshop on Quality of protection, New York, NY, USA, 2008, pp. 47-50 |
Sách, tạp chí |
Tiêu đề: |
Is complexity really the enemy of software security |
|
[10] Y. Shin and L. Williams, "An empirical model to predict security vulnerabilities using code complexity metrics," in The 2nd ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, New York, NY, USA, 2008, pp. 315-317 |
Sách, tạp chí |
Tiêu đề: |
An empirical model to predict security vulnerabilities using code complexity metrics |
|
[11] I. Chowdhury and M. Zulkernine, "Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities," Journal of Systems Architecture, vol. 57, no. 3, pp. 294-313, Mar 2011 |
Sách, tạp chí |
Tiêu đề: |
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities |
|
[12] T. Zimmermann, N. Nagappan, and L. Williams, "Searching for a needle in a haystack: Predicting security vulnerabilities for windows vista," in 2010 Third International Conference on Software Testing, Verification and Validation, Paris, France, 2010, pp. 421-428 |
Sách, tạp chí |
Tiêu đề: |
Searching for a needle in a haystack: Predicting security vulnerabilities for windows vista |
|
[13] P. Rotella, and L. Williams M. Gegick, "Toward non-security failures as a predictor of security faults and failures," in The 1st International Symposium on Engineering Secure Software and Systems, Springer-Verlag Berlin, 2009, pp. 135-139 |
Sách, tạp chí |
Tiêu đề: |
Toward non-security failures as a predictor of security faults and failures |
|
[14] V. H. Nguyen and L. M. S. Tran, "Predicting vulnerable software components with dependency graphs," in The 6th International Workshop on Security Measurements and Metrics, New York, NY, USA, 2010, p. 3 |
Sách, tạp chí |
Tiêu đề: |
Predicting vulnerable software components with dependency graphs |
|
[15] B. Smith and L. Williams, "Using SQL hotspots in a prioritization heuristic for detecting all types of web application vulnerabilities," in IEEE International Conference on Software Testing, Verification and Validation (ICST), Berlin, Germany, 2011, pp. 220-229 |
Sách, tạp chí |
Tiêu đề: |
Using SQL hotspots in a prioritization heuristic for detecting all types of web application vulnerabilities |
|
[16] M. Alenezi and I. Abunadi, "Evaluating Software Metrics as Predictors of Software Vulnerabilities," International Journal of Security and Its Applications, vol. 9, no. 10, pp. 231-240, Oct 2015 |
Sách, tạp chí |
Tiêu đề: |
Evaluating Software Metrics as Predictors of Software Vulnerabilities |
|
[17] R. Scandariato, J. Walden, A. Hovsepyan, and W. Joosen, "Predicting vulnerable software components via text mining," IEEE Transactions on Software Engineering, vol. 40, no. 10, pp. 993-1006, Mar 2014 |
Sách, tạp chí |
Tiêu đề: |
Predicting vulnerable software components via text mining |
|
[20] X. Xue, Y. Pang, and A. S. Namin, "Feature selections for effectively localizing faulty events in gui applications," in 2014 13th International Conference on Machine Learning and Applications, Detroit, MI, USA, 2014, pp. 306-311 |
Sách, tạp chí |
Tiêu đề: |
Feature selections for effectively localizing faulty events in gui applications |
|
[2] The Internet Engineering Task Force (IETF). (2000, May) RFC 2828. [Online]. https://tools.ietf.org/html/rfc2828 |
Link |
|
[3] ENISA. [Online]. https://www.enisa.europa.eu/topics/threat-risk-management/risk-management/current-risk/risk-management-inventory/glossary#G52 |
Link |
|
[18] Chih-Chung Chang and Chih-Jen Lin. (2016, Dec) LIBSVM. [Online]. https://www.csie.ntu.edu.tw/~cjlin/libsvm/ |
Link |
|
[21] Brakeman. (2016, Jun) Brakeman - Rails Security Scanner. [Online]. http://brakemanscanner.org/ |
Link |
|
[22] FindBugs. (2015, Jun) FindBugs - Find Bugs in Java Programs. [Online]. http://findbugs.sourceforge.net/[23] John W. Eaton. (1998) GNU Octave. [Online].https://www.gnu.org/software/octave/ |
Link |
|