共 50 条
- [1] A case study on the long-term effects of software redocumentation 20TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS, 2004, : 92 - 101
- [2] Identifying Malicious Software Using Deep Residual Long-Short Term Memory IEEE ACCESS, 2019, 7 : 163128 - 163137
- [3] Exploring the Long Tail of (Malicious) Software Downloads 2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 391 - 402
- [4] Conducting a Long-Term Case Study in a Software Firm: An Experience Report 2013 1ST INTERNATIONAL WORKSHOP ON CONDUCTING EMPIRICAL STUDIES IN INDUSTRY (CESI), 2013, : 47 - 50
- [5] Malicious software and system damages: Is there a case for liability of software vendors? ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 281 - 290
- [7] TANGIBLE LONG-TERM ASSET ACCOUNTING SOFTWARE SELECTION IN UKRAINE: CASE STUDY MANAGEMENT THEORY AND STUDIES FOR RURAL BUSINESS AND INFRASTRUCTURE DEVELOPMENT, 2013, 35 (02): : 194 - 207
- [8] Challenges of UX research and long-term UX: A multiple case study with software startups PROCEEDINGS OF THE 13TH NORDIC CONFERENCE ON HUMAN-COMPUTER INTERACTION, NORDICHI 2024, 2024,
- [9] A Measurement Study on Interprocess Code Propagation of Malicious Software DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 264 - 282
- [10] AceTree: a major update and case study in the long term maintenance of open-source scientific software BMC BIOINFORMATICS, 2018, 19