Sign in

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.

Vinod GanapathyDave KingTrent JaegerSomesh Jha
Published in: ICSE (2007)
Keyphrases
  • data analysis
  • data mining
  • static analysis
  • formal analysis
  • data sets
  • web services
  • risk assessment
  • security requirements