Author:
Elbaum Sebastian,Kanduri Satya,Andrews Anneliese
Publisher
Springer Science and Business Media LLC
Reference38 articles.
1. Barbara D, Wu N, Jajodia S (2001) Detecting novel network intrusions using bayes estimators. In: Proceedings of the international conference on data mining, pp 15–24
2. Basili V, Perricone B, (1984) Software errors and complexity: an empirical investigation. Commun ACM 27(1):42–52
3. Briand L, Emam KE, Freimut B, Laitenberger, O (2000) A comprehensive evaluation of capture-recapture models for estimating software defect content. IEEE Trans Softw Eng 26(6):234–244
4. Chillarege R, Bhandar I, Chaar J, Halliday M, Moebus D, Ray B, Wong M.-Y (1992) Orthogonal defect classification—a concept for in-process measurements. IEEE Trans Softw Eng 18(11): 325–345
5. Debar H, Becker M, Siboni D (1992) A neural network component for intrusion detection techniques. In: Proceedings of the symposium on research in security and privacy, pp 240–250
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献