Sciweavers

241 search results - page 5 / 49
» Predicting vulnerable software components
Sort
View
IEEEARES
2009
IEEE
14 years 2 months ago
Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones
Near Field Communication (NFC)-enabled mobile phones and services are starting to appear in the field, yet no attempt was made to analyze the security of NFC-enabled mobile phone...
Collin Mulliner
ISESE
2006
IEEE
14 years 1 months ago
Predicting component failures at design time
How do design decisions impact the quality of the resulting software? In an empirical study of 52 ECLIPSE plug-ins, we found that the software design as well as past failure histo...
Adrian Schröter, Thomas Zimmermann, Andreas Z...
AIM
2002
13 years 7 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
CSMR
2003
IEEE
14 years 25 days ago
Supporting Evolution in Component-Based Development Using Component Libraries
Component-based software development (CBSD) is a very promising software engineering technique for improving reuse and maintenance. Nevertheless, there are still some difficultie...
Miro Casanova, Ragnhild Van Der Straeten, Viviane ...