The availability of source code in relation to timely response to security vulnerabilities.
John ReinkeHossein SaiedianPublished in: Comput. Secur. (2003)
Keyphrases
- source code
- security vulnerabilities
- open source
- software systems
- intrusion detection
- high level
- software projects
- security properties
- software maintenance
- software repositories
- software evolution
- dos attacks
- plagiarism detection
- free software
- source files
- databases
- development process
- intrusion detection system
- legacy software