共 50 条
- [31] Assessing and Extracting Software Security Vulnerabilities in SOFL Formal Specifications [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 374 - 377
- [32] Automated Risk Management Based Software Security Vulnerabilities Management [J]. IEEE ACCESS, 2022, 10 : 90597 - 90608
- [35] Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2014, 2014, 8411 : 155 - 169
- [36] An Approach to Obtain Software Security Vulnerabilities Based on Vertical Search [J]. MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 3203 - 3206
- [37] A case study in detecting software security vulnerabilities using constraint optimization [J]. FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 1 - 11
- [38] A Double-Edged Sword? Software Reuse and Potential Security Vulnerabilities [J]. REUSE IN THE BIG DATA ERA, 2019, 11602 : 187 - 203
- [39] Software security growth modeling: Examining vulnerabilities with reliability growth models [J]. Quality of Protection: Security Measurements and Metrics, 2006, : 25 - 36