2008 6th IEEE International Conference on Industrial Informatics 2008
DOI: 10.1109/indin.2008.4618082
|View full text |Cite
|
Sign up to set email alerts
|

A framework for business-oriented security audit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…System that contains a large number of bugs, and/or bugs that fervently intrude with its functionality and operations, is said to be buggy. Reports enumerating bugs in a program are commonly known as bug reports, defect reports, fault reports, problem reports, and so forth [1]. Testers and debuggers have to go through all the code and multiple functions to trace the origin of the bug or say error to fix the system.…”
Section: Coding Instancesmentioning
confidence: 99%
See 1 more Smart Citation
“…System that contains a large number of bugs, and/or bugs that fervently intrude with its functionality and operations, is said to be buggy. Reports enumerating bugs in a program are commonly known as bug reports, defect reports, fault reports, problem reports, and so forth [1]. Testers and debuggers have to go through all the code and multiple functions to trace the origin of the bug or say error to fix the system.…”
Section: Coding Instancesmentioning
confidence: 99%
“…The process of debugging a software project may varies form interactive debugging or control flow manipulations. As we know that software systems have become generally more entangled, the various common debugging techniques have dilated with multiple methods to detect anomalies, estimate impact, and give remedy to a system for the given situation [1]. Fig.…”
Section: Coding Instancesmentioning
confidence: 99%