A cost-effective strategy for software vulnerability prediction based on bellwether analysis.
Patrick Kwaku KudjoJinfu ChenPublished in: ISSTA (2019)
Keyphrases
- cost effective
- low cost
- cost effectiveness
- real time
- prediction accuracy
- static analysis
- open source
- intrusion detection
- risk assessment
- prediction error
- prediction model
- software architecture
- business processes
- statistical analysis
- software development
- computational intelligence
- long term
- artificial neural networks
- neural network