Pfleeger Charles P.Security in Computing[M].USA:Prentice-Hall,1997.46-48.
[2]
Shin Y,Williams L.Is complexity really the enemy of software security [A].Proceedings of the Fourth ACM Workshop on Quality of Protection [C].Alexandria,Virginia,USA:ACM,2008.47-50.
[3]
Alhazmi OH,Malaiya YK.Prediction capabilities of vulnerability discovery models [A].Annual Reliability and Maintainability Symposium [C].Newport Beach,CA:RAMS,2006.86-91.
[4]
Shin Y,Williams L.An empirical model to predict security vulnerabilities using code complexity metrics [A].Proceedings of the Second ACM-IEEE InternationalSymposium on Empirical Software Engineering and Measurement [C].Kaiserslautern,Germany:ACM,2008.315-317.
[5]
Musa J D,Okumoto K.A logarithmic Poisson execution time model for software reliability measurement [A].Proceedings of the 7th International Conference on Software Engineering [C].Orlando:IEEE Press,1984.230-238.
[6]
Rescorla E.Is fining security holes a good idea[J].IEEE Security and Privacy,2005,3(1):14-19.
[7]
陈恺,冯登国,苏璞睿,等.一种多周期漏洞发布预测模型[J].软件学报,2010(9):2367-2375. Chen Kai,Feng Deng-guo,Su Pu-rui,et al.Multi-cycle vulnerability discovery model for prediction[J].Journal of Software,2010(9):2367-2375.(in Chinese)
[8]
Schultz Jr EE,Brown DS,Longstaff TA.Responding to Computer Security Incidents [OL].Lawrence Livermore National Laboratory,ftp://ftp.cert.dfn.de/pub/docs/csir/ihg.ps.gz,1990.
[9]
Alhazmi OH,Malaiya YK,Ray I.Measuring,analyzing and predicting security vulnerabilities in software systems[J].Computers & Security,2007,26(3):219-228.
[10]
Zhang Su,Caragea D,Ou Xinming.An empirical study on using the national vulnerability database to predict software vulnerabilities [A].Proceedings of the 22nd International Conference Database and Expert Systems Applications [C].Toulouse,France:DEXA,2011.217-231.
[11]
Kim J,Malaiya YK,Ray I.Vulnerability discovery in multi-version software systems [A].IEEE International Symposium on Software Reliability Engineering [C].Seattle,Washington:IEEE CPS,2008.299-300.
[12]
Anderson R.Security in open VeTSUS closed systems-The dance of Boltzmann,Coase and Moore [A].Proceedings of the Conference on Open Source Software Economics [C].Cambridge:MIT Press,2002.1-15.
[13]
Musa J D,Iannino A,Okumoto K.Software Reliability Engineering[M].NY:McGraw-Hill,1999.193-223.