Less is more

Author:

Braz Larissa1,Aeberhard Christian1,Çalikli Gül2,Bacchelli Alberto1

Affiliation:

1. University of Zurich

2. University of Glasgow

Funder

Swiss National Science Foundation

Swiss National Science Foundation 2

Publisher

ACM

Reference91 articles.

1. 2020. CWE Top 25 Most Dangerous Software Errors. https://cwe.mitre.org/top25/archive/2019/2019_cwe_top25.html. 2020. CWE Top 25 Most Dangerous Software Errors. https://cwe.mitre.org/top25/archive/2019/2019_cwe_top25.html.

2. 2020. GitLab: Mapping the DevSecOps Landscape - 2020 Survey. https://about.gitlab.com/developer-survey. 2020. GitLab: Mapping the DevSecOps Landscape - 2020 Survey. https://about.gitlab.com/developer-survey.

3. Software inspections: an effective verification process

4. A. Ackerman , P. Fowler , and R. Ebenau . 1984. Software Inspections and the Industrial Production of Software . In Proceedings of the Symposium on Software Validation: Inspection-Testing-Verification-Alternatives. 13--40 . A. Ackerman, P. Fowler, and R. Ebenau. 1984. Software Inspections and the Industrial Production of Software. In Proceedings of the Symposium on Software Validation: Inspection-Testing-Verification-Alternatives. 13--40.

5. O. Akinola and A. Osofisan. 2009. An Empirical Comparative Study of Checklist based and Ad Hoc Code Reading Techniques in a Distributed Groupware Environment. arXiv preprint arXiv:0909.4260 (2009). O. Akinola and A. Osofisan. 2009. An Empirical Comparative Study of Checklist based and Ad Hoc Code Reading Techniques in a Distributed Groupware Environment. arXiv preprint arXiv:0909.4260 (2009).

Cited by 13 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. On the acceptance by code reviewers of candidate security patches suggested by Automated Program Repair tools;Empirical Software Engineering;2024-08-03

2. Code-centric learning-based just-in-time vulnerability detection;Journal of Systems and Software;2024-08

3. Explaining poor performance of text-based machine learning models for vulnerability detection;Empirical Software Engineering;2024-07-22

4. Toward effective secure code reviews: an empirical study of security-related coding weaknesses;Empirical Software Engineering;2024-06-08

5. EvaCRC: Evaluating Code Review Comments;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3