03449oam 2200553I 450 991046675410332120200520144314.01-351-65088-21-315-15485-41-4987-7642-610.1201/9781315154855 (CKB)3790000000536715(MiAaPQ)EBC5164090(Au-PeEL)EBL5164090(CaPaEBR)ebr11479069(OCoLC)1015867817(OCoLC)1003994047(EXLCZ)99379000000053671520180706h20182018 uy 0engurcnu||||||||rdacontentrdamediardacarrierEmpirical research for software security foundations and experience /edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar WeipplBoca Raton, FL :CRC Press,[2018]©20181 online resource (323 pages)CRC series in security, privacy and trust1-4987-7641-8 Includes bibliographical references and index.chapter 1 Empirical Research on Security and Privacy by Design /Koen Yskout -- chapter 2 Guidelines for Systematic Mapping Studies in Security Engineering /Michael Felderer -- chapter 3 An Introduction to Data Analytics for Software Security -- chapter 4 Generating Software Security Knowledge Through Empirical Methods /Rene´ Noe¨l, Santiago Matalonga, Gilberto Pedraza, Herna´n Astudillo, and Eduardo B. Fernandez -- chapter 5 Visual Analytics: Foundations and Experiences in Malware Analysis /Markus Wagner -- chapter 6 Analysis of Metrics for Classification Accuracy in Intrusion Detection /Natalia Stakhanova -- chapter 7 The Building Security in Maturity Model as a Research Tool /Martin Gilje Jaatun -- chapter 8 Agile Test Automation for Web Applications — A Security Perspective /Sandra Domenique Ringmann -- chapter 9 Benchmark for Empirical Evaluation of Web Application Anomaly Detectors /Robert Bronte -- chapter 10 Threats to Validity in Empirical Software Security Research /Daniela S. Cruzes and Lotfi ben Othmane."Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher.Series in security, privacy, and trust.Computer securityComputer networksSecurity measuresElectronic books.Computer security.Computer networksSecurity measures.005.8Ben Othmane LotfiJaatun Martin GiljeWeippl EdgarFlBoTFGFlBoTFGBOOK9910466754103321Empirical research for software security2216351UNINA