Spelling suggestions: "subject:"5oftware failure."" "subject:"1software failure.""
11 |
Empirical validation of requirement error abstraction and classification a multidisciplinary approach /Walia, Gursimran Singh, January 2006 (has links)
Thesis (M.S.) -- Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
12 |
A formal application of safety and risk assessmen in software systems /Williamson, Christopher Loyal. January 2004 (has links) (PDF)
Thesis (Ph. D. in Software Engineering)--Naval Postgraduate School, Sept. 2004. / Thesis Advisor(s): Luqi. Includes bibliographical references. Also available online.
|
13 |
Using error modeling to improve and control software quality an empirical investigation /Walia, Gursimran Singh, January 2009 (has links)
Thesis (Ph.D.)--Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
|
14 |
Detection of Generalizable Clone Security Coding Bugs Using Graphs and Learning AlgorithmsMayo, Quentin R 12 1900 (has links)
This research methodology isolates coding properties and identifies the probability of security vulnerabilities using machine learning and historical data. Several approaches characterize the effectiveness of detecting security-related bugs that manifest as vulnerabilities, but none utilize vulnerability patch information. The main contribution of this research is a framework to analyze LLVM Intermediate Representation Code and merging core source code representations using source code properties. This research is beneficial because it allows source programs to be transformed into a graphical form and users can extract specific code properties related to vulnerable functions. The result is an improved approach to detect, identify, and track software system vulnerabilities based on a performance evaluation. The methodology uses historical function level vulnerability information, unique feature extraction techniques, a novel code property graph, and learning algorithms to minimize the amount of end user domain knowledge necessary to detect vulnerabilities in applications. The analysis shows approximately 99% precision and recall to detect known vulnerabilities in the National Institute of Standards and Technology (NIST) Software Assurance Metrics and Tool Evaluation (SAMATE) project. Furthermore, 72% percent of the historical vulnerabilities in the OpenSSL testing environment were detected using a linear support vector classifier (SVC) model.
|
15 |
Software Design Ethics for BiomedicineGotterbarn, Don, Rogerson, Simon 16 May 2006 (has links)
No description available.
|
Page generated in 0.0481 seconds