Security

Mining Apps for Abnormal Usage of Sensitive Data

Author(s): Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, and Eric Bodden
Venue: IEEE International Conference on Software Engineering
Date: 2015

4
Quality

Behind an Application Firewall, Are We Safe from SQL Injection Attacks?

Author(s): Dennis Appelt, Cu D. Nguyen, Lionel Briand
Venue: 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)
Date: 2015

4
Quality

Behind an Application Firewall, Are We Safe from SQL Injection Attacks?

Author(s): Dennis Appelts, Cu D. Nguyen, Lionel Briand
Venue: International Conference on Software Testing
Date: 2015

4
Quality

Vulnerability detection in recent Android apps: An empirical study

Author(s): Faysal Hossain Shezan, Syeda Farzia Afroze & Anindya Iqbal
Venue: 2017 International Conference on Networking, Systems and Security (NSysS)
Date: 5-8 Jan. 2017

4
Quality

Security attribute evaluation method: a cost-benefit approach

Author(s): Shawn A. Butler
Venue: ICSE
Date: 2002

3
Quality

Complexity Measures for Secure Service-Oriented Software Architectures

Author(s): Yanguo Liu, Issa Traore
Venue: International Workshop on Predictor Models in Software Engineering
Date: 2007

3
Quality

Empirical Relation between Coupling and Attackability in Software Systems: A Case Study on DOS

Author(s): Yanguo Liu, Issa Traore
Venue: PLAS 06
Date: 2006

3
Quality

Password Memorability and Security: Empirical Results

Author(s): Jeff Yan, Alan Blackwell, Ross Anderson, Alasdair Grant
Venue: IEEE Security & Privacy
Date: 2004

3
Quality

Security Testing Based on Attack Patterns

Author(s): J. Bozic, F. Wotawa
Venue: 2014 IEEE Seventh International Conference on Software Testing
Date: 2014

3
Quality

An Empirical Model to Predict Security Vulnerabilities use Code Complexity Metrics

Author(s): Yongshee Shin, Laurie Williams
Venue: ESEM 08
Date: 2007

3
Quality