共 50 条
- [31] Assessing and Extracting Software Security Vulnerabilities in SOFL Formal Specifications [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 374 - 377
- [32] Automated Risk Management Based Software Security Vulnerabilities Management [J]. IEEE ACCESS, 2022, 10 : 90597 - 90608
- [35] Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2014, 2014, 8411 : 155 - 169
- [36] An Approach to Obtain Software Security Vulnerabilities Based on Vertical Search [J]. MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 3203 - 3206
- [37] The Security Weakness of Block Cipher Piccolo against Fault Analysis [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
- [38] Using Fault Screeners for Software Error Detection [J]. EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, 2010, 69 : 60 - 74
- [39] A case study in detecting software security vulnerabilities using constraint optimization [J]. FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 1 - 11
- [40] A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities [J]. REUSE IN THE BIG DATA ERA, 2019, 11602 : 187 - 203