|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3 occurrences of 3 keywords
|
|
|
Results
Found 9 publication records. Showing 9 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
88 | Michael Gegick |
Failure-prone components are also attack-prone components. |
OOPSLA Companion |
2008 |
DBLP DOI BibTeX RDF |
attack-prone component |
46 | Michael Gegick, Laurie A. Williams, Jason A. Osborne, Mladen A. Vouk |
Prioritizing software security fortification throughcode-level metrics. |
QoP |
2008 |
DBLP DOI BibTeX RDF |
attack-prone, vulnerability-prone |
34 | Michael Gegick, Laurie A. Williams |
Ranking Attack-Prone Components with a Predictive Model. |
ISSRE |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Ekereuke Udoh, Vladimir Getov |
Performance Analysis of Denial-of-Sleep Attack-Prone MAC Protocols in Wireless Sensor Networks. |
UKSim |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Daniel D. Hein, Hossein Saiedian |
Predicting Attack Prone Software Components using Repository Mined Change Metrics. |
ICISSP |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Alexandra Czarlinska, Deepa Kundur |
Wireless image sensor networks: event acquisition in attack-prone and uncertain environments. |
Multidimens. Syst. Signal Process. |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Michael Gegick, Pete Rotella, Laurie A. Williams |
Predicting Attack-prone Components. |
ICST |
2009 |
DBLP DOI BibTeX RDF |
|
9 | José Fonseca 0002, Marco Vieira, Henrique Madeira |
Detecting Malicious SQL. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
Security, Intrusion Detection, Web applications |
9 | Miguel León Chávez, Carlos Hernández Rosete, Francisco Rodríguez-Henríquez |
Achieving Confidentiality Security Service for CAN. |
CONIELECOMP |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #9 of 9 (100 per page; Change: )
|
|