Prioritizing refactorings for security-critical code.
Chaima AbidVahid AlizadehMarouane KessentiniMouna DhaouadiRick KazmanPublished in: Autom. Softw. Eng. (2021)
Keyphrases
- source code
- security issues
- security level
- security requirements
- intrusion detection
- network security
- windows xp
- statistical databases
- protection scheme
- security problems
- information assurance
- security systems
- security policies
- data quality
- information security
- operating system
- access control
- functional requirements
- software evolution
- data security
- transformation rules
- rfid tags
- security threats