Login / Signup
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis.
Wentao Wang
Faryn Dumont
Nan Niu
Glen Horton
Published in:
IEEE Trans. Software Eng. (2022)
Keyphrases
</>
security vulnerabilities
dependency analysis
impact analysis
dos attacks
intrusion detection
security properties
penetration testing
data mining
computer systems
software systems
databases
database systems
source code
software development
information entropy
ontology driven