Why the Future Belongs to the Quants
IEEE Security and Privacy
Secure Software Engineering: Learning from the Past to Address Future Challenges
Information Security Journal: A Global Perspective
Software security metric identification framework (SSM)
Proceedings of the International Conference on Advances in Computing, Communication and Control
Impact of inheritance on vulnerability propagation at design phase
ACM SIGSOFT Software Engineering Notes
Software Fault Feature Clustering Algorithm Based on Sequence Pattern
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Security and performance in service-oriented applications: Trading off competing objectives
Decision Support Systems
Prioritization of software security intangible attributes
ACM SIGSOFT Software Engineering Notes
Hi-index | 0.00 |
This installment of Building Security In presents metrics that can help quantify the impact that process changes in one life-cycle phase have on other phases.