[1]Zhu Hong. Discussion on improving the twentyfirst century computer science and software industry development strategy of software quality assurance software security[EB/OL].[20100901]. http://www2.ccw.com.cn/1995/37/135973.html.(in Chinese)
[2]Defense Industry Daily. F22 squadron shot down by the International date line[EB/OL].[20070301].http://defenseindustrydaily.com/ F22squadroshotdownbytheInternationalDateLine 03087/.
[3]Wang Qing, Wu Shujian, Li Mingshu. Software defect prediction[J]. Journal of Software, 2008,19(7):15651580.(in Chinese)
[4]Rescorla E. Security holes…Who cares? [C]∥Proc of the 12th USENIX Security Symposium, 2003:7590.
[5]Joh H C, Kim J, Malaiya Y K. Vulnerability discovery modeling using Weibull distribution[C]∥Proc of the 19th Symposium on Software Reliability Engineer, 2008:299300.
[6]Alhazmi O H,Malaiya Y K. Quantitative vulnerability assessment of systems software[C]∥Proc of Annual Reliability and Maintainability Symposium,2005:615620.
[7]Alhazmi O H, Malaiya Y K, Ray I. Measuring, analyzing and predicting security vulnerabilities in software systems[J]. Computers & Security, 2007,26(3):219228.
[8]Alhazmi O H, Malaiya Y K. Application of vulnerability discovery models to major operating systems[J].IEEE Transactions on Reliability, 2008,57(1):13581364.
[9]Alhazmi O H, Malaiya Y K. Modeling the vulnerability discovery process[C]∥Proc of the 16th IEEE International Symposium on Software Reliability Engineering (ISSRE’05), 2005:129138.
[10]Wang Hongpo,Zhou Hongjian,Wang Honglei. Quantitative safety analysis of a kind of embedded software[C]∥Proc of IEEE International Conference on Computer Science and Automation Engineering,2011:391397.
[11]Zeng Fuping, Jin Huiliang, Lu Minyan. Study on software detect patterns[J]. Computer Science, 2011,38(2):127130.(in Chinese)
[12]Guo Lina, Yang Yang. A classfication algorithm of detect prediction for software modules based on fuzzy support vector machine[J]. Journal of Nanjing University(Natural Sciences), 2012,48(2):221227.(in Chinese)
[13]Zhao Liang, Hou Jinbao. Software fault prediction on the file and package level[J]. Journal of Tsinghua University(Science and Technology),2011,51(S1):14721476.(in Chinese)
[14]Musa J. Software reliability engineering[M]. New York:McGrawHill, 1999.
[15]GJB/Z102—97,Software reliability and safety design criteria[S]. Beijing:the commission of Science, Technology and Industry for National Defense of the PRC,1997.(in Chinese)
[16]Draft Standard IEC 61508, Functional safety of electrical/electronic/programmable electronic safetyrelated systems[S]. Geneva:International Electrotechnical Commission, 1998.
[17]Madan B B, GosevaPopstojanova K, Vaidyanathan K, et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems[J]. Performance Evaluation, 2004,56(14):167186.
附中文参考文献:
[1]朱鸿. 提高软件质量保障软件安全—探讨21世纪计算机科学与软件产业发展战略[EB/OL].[20100901].http://www2.ccw.com.cn/1995/37 /135973.html.
[3]王青,伍书剑,李明树. 软件缺陷预测技术[J].软件学报,2008,19(7):15651580.
[11]曾福萍, 靳慧亮,陆民燕. 软件缺陷模式的研究[J].计算机科学,2011,38(2):127130.
[12]郭丽娜,杨杨.一种基于模糊支持向量机软件模块缺陷检测算法[J].南京大学学报(自然科学版),2012,48(2):221227.
[13]赵亮,侯金宝.文件和包层次的软件缺陷预测[J]. 清华大学学报(自然科学版),2011, 51(S1):14721476.
[15]GJB/Z102—97,软件可靠性和安全性设计准则[S].北京:国防科学技术工业委员会,1997. |