共 50 条
- [21] The simple economics of an external shock to a bug bounty platform [J]. JOURNAL OF CYBERSECURITY, 2024, 10 (01):
- [22] An Empirical Study on Bug Assignment Automation Using Chinese Bug Data [J]. ESEM: 2009 3RD INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2009, : 452 - 456
- [23] A Comprehensive Study of Bug Fixes in Quantum Programs [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2022), 2022, : 1239 - 1246
- [24] Bug Replication in Code Clones: An Empirical Study [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 68 - 78
- [25] An Empirical Study of Bug Report Field Reassignment [J]. 2014 SOFTWARE EVOLUTION WEEK - IEEE CONFERENCE ON SOFTWARE MAINTENANCE, REENGINEERING, AND REVERSE ENGINEERING (CSMR-WCRE), 2014, : 174 - +
- [27] Bountychain: Toward Decentralizing a Bug Bounty Program with Blockchain and IPFS [J]. International Journal of Networked and Distributed Computing, 2021, 9 : 86 - 93
- [29] BOUNTY PROGRAMS - AN EFFECTIVE WEED MANAGEMENT TOOL [J]. WEED TECHNOLOGY, 1988, 2 (02) : 196 - 197