|
S. Christey, “Preliminary List of Vulnerability Examples for Researchers”, 2006.http://cwe.mitre.org/documents/PLOVER.pdf.
|
|
Y. Huang, X. He, J. Wang, and Z. Lei, “An Evaluation Method Oriented to the Comprehensive Credibility of Simulation Data Source Based on Evidence Theory,” vol. 5, no. 2, 2016.
|
|
R. Jiang, “A Trustworthiness Evaluation Method for Software Architectures Based on the Principle of Maximum Entropy (Pome) and the Grey Decision-making Method (Gdmm),” Entropy, vol. 16, no. 9, pp. 4818–4838, 2014.
|
|
K. Liu, “Overview on Major Research Plan of Trustworthy Software,” Bulletin of National Natural Science Foundation of China, 2008.
|
|
Y. Li and Y. Chen, “A Measurement Model for Trustworthy Software Based on Trusted Evidences,” in International Symposium on System and Software Reliability, 2017, pp. 20–24.
|
|
T. J. Mccabe, “A Complexity Measure,” IEEE Transactions on Software Engineering, vol. SE-2, no. 4, pp. 308–320, 2006.
|
|
M. Rong, “A Model for CPS Software System Trustworthiness Evaluation Based on Attributes Classifying”, 2013.
|
|
A. F. Seila, “Simulation and the Monte Carlo Method,” Technometrics, vol. 24, no. 2, pp. 167–168, 2012.
|
|
K. Shibata, K. Rinsaka, and T. Dohi, “Metrics-based Software Reliability Models Using Non-homogeneous Poisson Processes,” in International Symposium on Software Reliability Engineering, 2006, pp. 52–61.
|
|
H. Tao and Y. Chen, “A New Metric Model for Trustworthiness of Softwares,” Kluwer Academic Publishers, 2012.
|
|
H. Tao and Y. Chen, “A Metric Model for Trustworthiness of Softwares,” in Ieee/wic/acm International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2009, pp. 69–72.
|