A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Forecasting Field Defect Rates Using a Combined Time-Based and Metrics-Based Approach: A Case Study of OpenBSD
16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05)
In this paper, we present an empirical case study of ten releases of OpenBSD. ...
We identify the SRGM that produces the most accurate forecasts and subjectively determine the preferred metrics-based prediction method and set of predictors. ...
We would like to thank the developers of OpenBSD for their insight and tool vendors who gave us trial licenses. ...
doi:10.1109/issre.2005.19
dblp:conf/issre/LiHS05
fatcat:m3bnl5zgrzg65fzm7pihkac2dy
A survey and taxonomy of approaches for mining software repositories in the context of software evolution
2007
Journal of Software Maintenance and Evolution Research and Practice
used (how), and the evaluation method (quality). ...
A comprehensive literature survey on approaches for mining software repositories (MSR) in the context of software evolution is presented. ...
The authors described their study on five NASA applications. Various data-mining tools LSR, M5, J48, and ROCKY were used to automatically generate defect detectors. ...
doi:10.1002/smr.344
fatcat:zri7uxf7aba6forbe77gkmw2ru
Which is the right source for vulnerability studies?
2010
Proceedings of the 6th International Workshop on Security Measurements and Metrics - MetriSec '10
Recent years have seen a trend towards the notion of quantitative security assessment and the use of empirical methods to analyze or predict vulnerable components. ...
In our work, we focus on a more fundamental question: the quality of vulnerability database. We provide an analytical comparison of different security metric papers and the relative data sources. ...
[29] build a logistic regression model to predict post-release defects of Eclipse using several metrics on different levels of code base i.e., methods, classes, files and packages. ...
doi:10.1145/1853919.1853925
fatcat:cul7kftv45dubjxpichpdxlrj4
Analysis of operating system diversity for intrusion tolerance
2013
Software, Practice & Experience
Ilir Gashi has been supported by a Strategic Development Fund (SDF), and a Pump Priming Fund grant, both from City University London. ...
This work was partially supported by the EC through project FP7-257475 (MASSIF) and by the FCT through the Multiannual and the CMU-Portugal Programmes, and the project PTDC/EIA-EIA/100894/2008 (DIVERSE ...
This study was based on fault injection: combinations of valid and invalid parameters were supplied to often-used system calls 6 M. ...
doi:10.1002/spe.2180
fatcat:bvm5gvobjjhtxiflrwi5a5aktq
OS diversity for intrusion tolerance: Myth or reality?
2011
2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. ...
We found this number to be low for several combinations of OSes. ...
Ilir Gashi is supported by a Strategic Development Fund (SDF) grant from City University London. ...
doi:10.1109/dsn.2011.5958251
dblp:conf/dsn/GarciaBGNO11
fatcat:45irvz6mnfdojpowepktazdvhe
A Comprehensive Review of Cybersecurity in Inverter-based Smart Power System amid the Boom of Renewable Energy
2022
IEEE Access
This paper presents a comprehensive review of the system structure and vulnerabilities of typical inverter-based power system with distributed energy resources (DERs) integration, nature of several types ...
Finally, challenges, unsolved problems, and future direction of the field are discussed and concluded at the end of the journal. ...
the drafting of this study, also special thanks to Hoang Nhat for his help in designing and drawing beautiful figures for this journal and Le Ngoc Dung for his help in data analysis and classification ...
doi:10.1109/access.2022.3163551
fatcat:adylc72usbenzb6awm3pyqiyri
Network Organization and Governance
[chapter]
2018
CRC Handbook of Modern Telecommunications
OpenSSH was developed by the OpenBSD project and thus has a BSD license. ...
This bottom-up approach to technology innovation and adaptation is a first, and is indicative of the rate of change in electronic technologies. ...
Existing prepaid systems heavily rely on network-based charging, which can deal with time-based charging, but are incapable of charging the combination of voice, data, and content services. ...
doi:10.1201/9781420078084-9
fatcat:eyixyd27nzbmthwoqybadgqz2e
What Makes a Great Software Engineer?
2015
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering
However, today, we lack a holistic, contextual, and real-world understanding of software engineering expertise. ...
on ratings. ...
The approach of inductively deriving a set of attributes based on qualitative interviews and then conducting a qualitative survey based on the findings, is a good approach (we use the same in this thesis ...
doi:10.1109/icse.2015.335
dblp:conf/icse/LiKZ15
fatcat:kmncmxi2avhkjbdaclcvzciz2q
A descriptive process model for open-source software development
[article]
2005
Abstract Open Source is a term used to describe a tradition of open standards, shared source code, and collaborative software development. ...
My appreciation and respect to those who have pioneered open-source software development. It is a truly unique approach and a fascinating area for research. ...
Defects per thousand deltas (KDelta) is used to handle the problem of bloated code (considered bad but with an artificially low defect rate).
4? earlier reduction of errors. ...
doi:10.11575/prism/22282
fatcat:7zgjsnwv2fdgtbsxn72ppsb5be
EMERGING Publicity Chairs EMERGING Publicity Chairs EMERGING 2015 Technical Program Committee
Advanced Informatics School
unpublished
We also hope that Nice, France, provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city. EMERGING 2015 Chairs EMERGING Advisory Chairs ...
We also kindly thank all the authors that dedicated much of their time and effort to contribute to EMERGING 2015. ...
and deployment of the SmartCampus testbed. ...
fatcat:tdu3exqwnzdbhkceqpxpcxes4m