LEADER 03449oam 2200553I 450 001 9910466754103321 005 20200520144314.0 010 $a1-351-65088-2 010 $a1-315-15485-4 010 $a1-4987-7642-6 024 7 $a10.1201/9781315154855 035 $a(CKB)3790000000536715 035 $a(MiAaPQ)EBC5164090 035 $a(Au-PeEL)EBL5164090 035 $a(CaPaEBR)ebr11479069 035 $a(OCoLC)1015867817 035 $a(OCoLC)1003994047 035 $a(EXLCZ)993790000000536715 100 $a20180706h20182018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aEmpirical research for software security $efoundations and experience /$fedited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl 210 1$aBoca Raton, FL :$cCRC Press,$d[2018] 210 4$d©2018 215 $a1 online resource (323 pages) 225 1 $aCRC series in security, privacy and trust 311 $a1-4987-7641-8 320 $aIncludes bibliographical references and index. 327 $tchapter 1 Empirical Research on Security and Privacy by Design /$rKoen Yskout -- $tchapter 2 Guidelines for Systematic Mapping Studies in Security Engineering /$rMichael Felderer -- $tchapter 3 An Introduction to Data Analytics for Software Security -- $tchapter 4 Generating Software Security Knowledge Through Empirical Methods /$rReneŽ Noešl, Santiago Matalonga, Gilberto Pedraza, HernaŽn Astudillo, and Eduardo B. Fernandez -- $tchapter 5 Visual Analytics: Foundations and Experiences in Malware Analysis /$rMarkus Wagner -- $tchapter 6 Analysis of Metrics for Classification Accuracy in Intrusion Detection /$rNatalia Stakhanova -- $tchapter 7 The Building Security in Maturity Model as a Research Tool /$rMartin Gilje Jaatun -- $tchapter 8 Agile Test Automation for Web Applications ? A Security Perspective /$rSandra Domenique Ringmann -- $tchapter 9 Benchmark for Empirical Evaluation of Web Application Anomaly Detectors /$rRobert Bronte -- $tchapter 10 Threats to Validity in Empirical Software Security Research /$rDaniela S. Cruzes and Lotfi ben Othmane. 330 $a"Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher. 410 0$aSeries in security, privacy, and trust. 606 $aComputer security 606 $aComputer networks$xSecurity measures 608 $aElectronic books. 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 702 $aBen Othmane$b Lotfi 702 $aJaatun$b Martin Gilje 702 $aWeippl$b Edgar 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910466754103321 996 $aEmpirical research for software security$92216351 997 $aUNINA