M Jiménez, M Piattini, A Vizcaíno - Advances in Software …, 2009 - Wiley Online Library
Distributed Software Development (DSD) has recently evolved, resulting in an increase in the available literature. Organizations now have a tendency to make greater development …
Modern software development frequently uses third-party packages, raising the concern of supply chain security attacks. Many attackers target popular package managers, like npm …
Defect prediction models help software quality assurance teams to allocate their limited resources to the most defect-prone modules. Model validation techniques, such as-fold …
Context: Identifying potential vulnerable code is important to improve the security of our software systems. However, the manual detection of software vulnerabilities requires expert …
Prediction of software defects works well within projects as long as there is a sufficient amount of data available to train any models. However, this is rarely the case for new …
Y Shin, A Meneely, L Williams… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Security inspection and testing require experts in security who think like an attacker. Security experts need to know code locations on which to focus their testing and inspection efforts …
HK Dam, T Tran, T Pham, SW Ng… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Code flaws or vulnerabilities are prevalent in software systems and can potentially cause a variety of problems including deadlock, hacking, information loss and system failure. A …
Ownership is a key aspect of large-scale software development. We examine the relationship between different ownership measures and software failures in two large …
Y Zhou, Y Yang, H Lu, L Chen, Y Li, Y Zhao… - ACM Transactions on …, 2018 - dl.acm.org
Background. Recent years have seen an increasing interest in cross-project defect prediction (CPDP), which aims to apply defect prediction models built on source projects to a …