Publisher
Springer Science and Business Media LLC
Subject
Strategy and Management,Safety, Risk, Reliability and Quality
Reference74 articles.
1. Alelyani S, Tang J, Liu H (2013) Feature selection for clustering: a review. Data Cluster Algorith Appl 29:60
2. Anand A, Das S, Aggrawal D, Klochkov Y (2017) Vulnerability discovery modelling for software with multi-versions. In: advances in reliability and system engineering, Springer, pp 255–265
3. Anjum M, Kapur P, Agarwal V, Khatri SK (2020) Assessment of software vulnerabilities using best-worst method and two-way analysis. Int J Math Eng Manag Sci 5:328–342
4. Arcuri A, Briand L (2014) A hitchhiker’s guide to statistical tests for assessing randomized algorithms in software engineering. Soft Test Verificat Reliab 24:219–250
5. Arshad FA, Krause RJ, Bagchi S (2013) Characterizing configuration problems in java ee application servers: an empirical study with glassfish and jboss. In: 2013 IEEE 24th international symposium on software reliability engineering (ISSRE), pp. 198–207.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Text mining based an automatic model for software vulnerability severity prediction;International Journal of System Assurance Engineering and Management;2024-05-31