Papers

Export 16 results:
Filters: Keyword is security  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
J. - H. Hoepman and Jacobs, B., Increased security through open source, Communications of the ACM, vol. 50, pp. 79–83, 2007.PDF icon 0801.3924.pdf (95.95 KB)
M
A. Mauczka, Schanes, C., Fankhauser, F., Bernhart, M., and Grechenig, T., Mining security changes in FreeBSD, in 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010), Cape Town, South Africa, 2010, pp. 90 - 93.
P
W. Scacchi and Alspaugh, T. A., Processes in Securing Open Architecture Software Systems, in Proceedings of the 2013 International Conference on Software and System Process, New York, NY, USA, 2013, pp. 126–135.PDF icon Scacchi-Alspaugh-ICSSP13.pdf (1.27 MB)
S
D. Pletea, Vasilescu, B., and Serebrenik, A., Security and Emotion: Sentiment Analysis of Security Discussions on GitHub, in Proceedings of the 11th Working Conference on Mining Software Repositories, New York, NY, USA, 2014, pp. 348–351.PDF icon pletea.pdf (250.26 KB)
R. Anderson, Security in open versus closed systems—the dance of Boltzmann, Coase and Moore. Technical report, Cambridge University, England, 2002.PDF icon toulouse.pdf (119.58 KB)
G. Schryen, Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities, AMCIS 2009 Proceedings, p. 387, 2009.PDF icon Schryen_-_AMCIS_09_-_Security_of_open_source_and_closed_source_software_-_Web_version.pdf (442.07 KB)
C. Payne, On the security of open source software, Information systems journal, vol. 12, pp. 61–78, 2002.PDF icon Payne2002_ISJ12_SecurityOSS.pdf (111.53 KB)
C. Cowan, Software security for open-source systems, IEEE Security & Privacy Magazine, vol. 1, no. 1, pp. 38 - 45, 2003.
N. Good, Dhamija, R., Grossklags, J., Thaw, D., Aronowitz, S., Mulligan, D., and Konstan, J., Stopping spyware at the gate: a user study of privacy, notice and spyware, in 2005 Symposium on Usable Privacy and Security, Pittsburgh, PA, 2005, pp. 43-52.