Publisher
Springer Science and Business Media LLC
Reference16 articles.
1. Ameller D, Farré C, Franch X, Valerio D, Cassarino A (2017) Towards continuous software release planning. In: Software analysis, evolution and reengineering (SANER), 2017 IEEE 24th International Conference, pp 402–406
2. Avdoshin SM, Pesotskaya EY (2016) Software risk management: using the automated tools. In: Becker J et al (eds) Emerging trends in information systems. Springer, Netherlands, pp 85–97. doi: 10.1007/978-3-319-23929-3_8
3. Chen X, Qi Y, Bai B, Lin Q, Carbonell JG (2011). Sparse latent semantic analysis. In: Proceedings of the 2011 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, pp 474–485
4. Chess B, McGraw G (2004) Static analysis for security. IEEE Security and Privacy, 2(6), pp 76–79
5. ETSI (2015) Methods for Testing and Specification: Risk-based Security Assessment and Testing Methodologies. http://www.etsi.org/deliver/etsi_eg/203200_203299/203251/01.01.01_50/eg_203251v010101m.pdf . Accessed 20 April 2017
Cited by
65 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures;Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses;2023-11-26
2. Computer Intelligence-Based Fruit Grading;Advances in Environmental Engineering and Green Technologies;2023-06-30
3. Emergency Medical System using ML;2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS);2023-03-17
4. An Approach to Address Risk Management Challenges: Focused on IT Governance Framework;2022 IEEE International Conference on Cyber Security and Resilience (CSR);2022-07-27
5. A novel approach to continuous CVE analysis on enterprise operating systems for system vulnerability assessment;International Journal of Information Technology;2022-02-09