{"id":"https://openalex.org/W2084120184","doi":"https://doi.org/10.1109/issrew.2013.6688858","title":"Using software reliability models for security assessment &amp;#x2014; Verification of assumptions","display_name":"Using software reliability models for security assessment &amp;#x2014; Verification of assumptions","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W2084120184","doi":"https://doi.org/10.1109/issrew.2013.6688858","mag":"2084120184"},"language":"en","primary_location":{"id":"doi:10.1109/issrew.2013.6688858","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issrew.2013.6688858","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043690102","display_name":"Da Young Lee","orcid":"https://orcid.org/0000-0002-8211-2393"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Da Young Lee","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, NC, USA","Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA#TAB#","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108545096","display_name":"Mladen A. Vouk","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mladen Vouk","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, NC, USA","Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA#TAB#","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028171895","display_name":"Laurie Williams","orcid":"https://orcid.org/0000-0003-3300-6540"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laurie Williams","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, Raleigh, NC, USA","Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA#TAB#","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5043690102"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":1.9442,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.86762075,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"23","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10780","display_name":"Reliability and Maintenance Optimization","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7354245781898499},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.6476378440856934},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5417014956474304},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.5153172016143799},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.4314800798892975},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4287336468696594},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4074747562408447},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.18745073676109314},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17842712998390198},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.14309772849082947},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14249759912490845},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.13762930035591125},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12904730439186096},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.06346884369850159}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7354245781898499},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.6476378440856934},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5417014956474304},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.5153172016143799},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.4314800798892975},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4287336468696594},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4074747562408447},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.18745073676109314},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17842712998390198},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.14309772849082947},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14249759912490845},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.13762930035591125},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12904730439186096},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.06346884369850159},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/issrew.2013.6688858","is_oa":false,"landing_page_url":"https://doi.org/10.1109/issrew.2013.6688858","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W94015702","https://openalex.org/W208717196","https://openalex.org/W1916292832","https://openalex.org/W2117039703","https://openalex.org/W2171242934","https://openalex.org/W2464662369"],"related_works":["https://openalex.org/W2033512842","https://openalex.org/W4322734194","https://openalex.org/W4233600955","https://openalex.org/W2913665393","https://openalex.org/W2369695847","https://openalex.org/W3005535424","https://openalex.org/W2994319598","https://openalex.org/W2047067935","https://openalex.org/W1607054433","https://openalex.org/W2110842462"],"abstract_inverted_index":{"Can":[0],"software":[1,8,46,58,100,110],"reliability":[2,27,59,101],"models":[3,28,61,103],"be":[4,31,86],"used":[5],"to":[6,49,104],"assess":[7,105],"security?":[9],"One":[10],"of":[11,42,53,65,108],"the":[12,54],"issues":[13],"is":[14],"that":[15,73,109],"security":[16,47,66,81],"problems":[17,48,67],"are":[18],"relatively":[19],"rare":[20],"under":[21,77],"\u201cnormal\u201d":[22,78],"operational":[23,79],"profiles,":[24],"while":[25],"\u201cclassical\u201d":[26],"may":[29,85],"not":[30],"suitable":[32],"for":[33,63],"use":[34,97],"in":[35,68,74,111],"attack":[36],"conditions.":[37],"We":[38,71],"investigated":[39],"a":[40,89],"range":[41],"Fedora":[43],"open":[44],"source":[45],"see":[50],"if":[51],"some":[52,75],"basic":[55],"assumptions":[56],"behind":[57],"growth":[60,102],"hold":[62],"discovery":[64],"non-attack":[69,112],"situations.":[70,113],"find":[72],"cases,":[76,94],"use,":[80],"problem":[82],"detection":[83],"process":[84],"described":[87],"as":[88],"Poisson":[90],"process.":[91],"In":[92],"those":[93],"we":[95],"can":[96],"appropriate":[98],"classical":[99],"\u201csecurity":[106],"reliability\u201d":[107]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
