Early estimation of defect density of a product is an important step towards the remediation of the problem associated with affordably guiding corrective actions in the software d...
Mark Sherriff, Nachiappan Nagappan, Laurie A. Will...
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
In this paper, we propose an approach for systematic security hardening of software based on aspect-oriented programming and Gimple language. We also present the first steps towar...
This paper analyses the cognitive difficulty of six courses that may be taken as credit towards an IT degree offered by a regional Australian University. The assessment requiremen...
Dave Oliver, Tony Dobele, Myles Greber, Tim Robert...
Data mining focuses on the development of methods and algorithms for such tasks as classification, clustering, rule induction, and discovery of associations. In the database fiel...