Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Wang, T.t., Han, W., Wang, H.: Analyze model of softerware based on security flaw required. Computer sinc. 34(9) (2007)
2. Kallen, M.J., van Noortwijk, J.M.: Optimal periodic onspection of a deteriation process with sequential condition states. Int. J. Pressel Vessel Piping (in press) (this issue)
3. Byers, D., Ardi, S., Shahmehri, N., Duma, C.: Modeling Software Vulnerabilities With Vulnerability Cause Graphs. In: The 22nd IEEE International Conference on Software Maintenance (2006)
4. Viega, J., Bloch, J.T., Kohno, T., McCraw, G.: ITS4: A Static Vulnerability Scanner for C and C++ Code. Annual Computer Security Applications Conference (December 2000)
5. Evans, D., Guttag, J., Horning, J., Meng, Y.: LCLint: A Tool for Using Specification to Check Code. In: SIGSOFT Symposium on the Foundations of Software Engineering (December 1994)