共 50 条
- [31] Assessing and Extracting Software Security Vulnerabilities in SOFL Formal Specifications 2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 374 - 377
- [36] Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2014, 2014, 8411 : 155 - 169
- [37] An Approach to Obtain Software Security Vulnerabilities Based on Vertical Search MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 3203 - 3206
- [38] A case study in detecting software security vulnerabilities using constraint optimization FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 1 - 11
- [39] A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities REUSE IN THE BIG DATA ERA, 2019, 11602 : 187 - 203
- [40] Software security growth modeling: Examining vulnerabilities with reliability growth models Quality of Protection: Security Measurements and Metrics, 2006, : 25 - 36