CN101710306A - Method and system for detecting software reliability - Google Patents
Method and system for detecting software reliability Download PDFInfo
- Publication number
- CN101710306A CN101710306A CN200910242716A CN200910242716A CN101710306A CN 101710306 A CN101710306 A CN 101710306A CN 200910242716 A CN200910242716 A CN 200910242716A CN 200910242716 A CN200910242716 A CN 200910242716A CN 101710306 A CN101710306 A CN 101710306A
- Authority
- CN
- China
- Prior art keywords
- software
- data
- trust
- software process
- standard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Stored Programmes (AREA)
Abstract
The invention discloses a method and a system for detecting software reliability. The method comprises the following steps of: (1) selecting special software process evaluation indexes and software reliable evaluation indexes according to characteristics of software; (2) acquiring software process actual data according to the selected software process evaluation indexes; 3) establishing a mapping model between the software process data and software reliable data, providing software reliability degree data, training the model by using the data in a history item, acquiring corresponding weight coefficients in an error-satisfied set range, inputting the acquired software process actual data into the model, and calculating the software reliability degree; and 4) obtaining the software reliability according to the standard software reliability degree. By using the method, the reliability level of the software can be detected according to the actual data in the software development process to grasp the defects of the software in advance, ensure the reliability of the software and achieve the aim of nipping in the bud.
Description
Technical field
The invention belongs to the computer software engineering field, relate to a kind of detection method and system of software credibility, relate generally to according to the data of software development process and estimate other method and system of software trust degree level.
Background technology
Along with the fast development of global economic integration progress and the aggravation of market competition, various software systems are penetrated into Aero-Space, industrial process control, commercial affairs and wide spectrums such as finance, enterprise and government day by day in the modern society, and are bringing into play irreplaceable effect.And, the application demand of software is more and more, complexity is more and more higher, usability requirements is more and more stronger, and huge day by day software systems are more and more fragile, and various faults and inefficacy take place, directly or indirectly the user is caused huge infringement, in some special application fields, in a single day software systems lost efficacy, and caused great or even catastrophic loss piece act very for human life's property and environment.
For example: European A Liyana 5 type rockets are launched 40 seconds after-explosions because the data-switching mistake of inertial reference system software causes software failure first on June 4th, 1996, cause 2,500,000,000 dollars economic loss; In American Electric Power Detection ﹠ Controling management system, because distributed computer system is attempted to visit simultaneously same resource and caused software failure, caused the Northeastern United States large-area power-cuts on August 14th, 2003, loss is above 6,000,000,000 dollars; Tokyo stock exchange is because the system failure appears in software upgrading, and on November 1st, 2005 caused serious stock market to be stopped; Only the software systems fault has just taken place three times in China Air China letter departure system in 2006, causes more or less a hundred airport boarding system paralysis; At information security field, because the safety defect that exists in the software, " Panda burning incense " virus in 2007 just makes up to a million computer infected overnight and is destroyed; The other kinds information network relevant with the software credibility problem of breaking laws and commit crime also is on the rise, and China investigated and prosecuted 41379 of domestic information network crime cases altogether in 2006, increased by 98.9% than 2005.In addition, overseas anti-China forces and Taiwan authorities utilize software defect to continent implementation information strikepiston, for example wooden horse plan (claiming Aegis plan, the plan of Zeus's shield again), Darwin plan and jasmine plan or the like, serious harm national security.
Creditability measurement is the basis of believable software process management, compares with traditional engineering, and software creditability measurement is ripe not enough aspect measure, measurement model.The tradition engineering often can perform calculations, test and verify by setting up model before carry out production, thereby guaranteed to have after production comes out the character of expectation.Soft project is compared with traditional engineering, does not still possess similar theoretical foundation at present.Take a broad view of existing theory of program, majority concentrates on towards program correctness, and perhaps some theoretical splicings are not enough to the unified basis as software trust character.This is embodied on technological layer aspect two, on the one hand, for single believability, analyzes, designs and guarantee that the technology of this character is usually separated, and has semantic gully.For example, the reliable and secure property to the reaction equation system technology such as failure mode and impact analysis technology, fault-tolerant calculation, scheduling, formalization checking are arranged, but these technology is still each self-separation, do not form an integrated technology framework.On the other hand, to a plurality of believabilities, can cause conflict to design decision between these character, for example, fault-tolerant character tends to have influence on real-time, and present theory of program is failed as instructing the fusion of character, compromise basis.From phase early 1970s, Anderson has proposed since the notion of trusted system (trusted system) first, and the credible problem of software just is subjected to the extensive concern of academia and industry member always.Only software credibility is positioned in the trusted computer system interpretational criteria of the National Computer Security center NCSC proposal on this unique qualitative attribute of security (Tang, D.1997).People's such as Parnas research then is defined as software credibility the how appropriate of the software engineering technology (as strengthening test, evaluation, inspection etc.) into the reduction error rate.High trusted software system requirements can prove amply or authenticate and satisfy some key property (being called high believability) when these software systems provide service.Discussion and research about software credibility based on the security that centers on software has appearred in late 1980s in the world, wherein TSM (trusted software methodology) project that is participated in by how tame government of the U.S. and establishment was " software satisfies the confidence degree of set demand " in 1994 with the software credibility expanded definition, set forth credible high dependency (E.Amoroso to management decision, technology decision-making and set requirements set, C.Taylor, J.Watson, J.Weiss, 1994).
Along with software size is increasing, the knowledge that relates to cross discipline is more and more, range of application is more and more wider, and the complicacy of project, intellectual feature are also more and more significant, important trend and inevitable choice that the structure trusted software has become the modern software technology development and used.Present trusted software structure and operational support technology, creditability measurement and evaluating method famine make software just contain much known or unknown defectives when releasing, and the safe and reliable operation of software systems has been constituted threat in various degree.
Since the nineties in 20th century, formalization stipulations method and modelling verification technology have become the main direction of studying of credible security technology.Aspect the tolerance and assessment technique of credible attribute, achievement in research comprises the definition and the appraisal procedure of credible attribute.The main evaluation index relevant with software reliability has MTTUF averaging time (Mean Time To Unsafe Failure) of mean free error time MTBF, mean time between failures MTBF and non-safety inefficacy etc. at present.
Aspect the economic model of credible attribute, the achievement in research represented the most with the COCOMO series model of American South University of California has appearred, comprise support to the software defect rate being the COQUALMO model that the software quality of representative is carried out estimate analysis; To the COCOTS series model of supporting based on the analysis and decision of COTS cost of developing, risk aspect; Cost Estimation Model COSECMO (Constructive Security Model) to software security; System's reliability (Dependability) at reliability (Reliability) intended investment level guarantees strategy and investment repayment analytical model iDAVE or the like.In addition, the SAEM of the CMU-SEI of the U.S. (Security Attribute Evaluation Method) also analyzes the economic effect of the various different designs schemes of contrast from the Safety Design attribute, support rational security re-set target is set and managed to user's decision-making how.
The method of these models mainly comprises two kinds: on the one hand directly extract some attribute factors from the demand for the treatment of development system and architecture design information, make up the correlated quality model, support to set up rational credible target expection; Study on the other hand under integrated development situation based on member, COTS or other reusable assembly and existing system, how to be independent of the variable credible factor of the project control at some, as the COTS version change, problems such as the safety assessment rank of a plurality of COTS is inconsistent are carried out effective risk assessment and management.
Chen Huowang academician (2003) thinks that software development is the process of a complexity, is the indispensable important means that improves software quality by management and control to software process.Therefore, software process is to high trusted software exploitation important influence.Software process management is the important means that ensures software quality, software quality standard is (as CMM/CMMI, ISO/IEC I5504, Bootstrap etc.) all be the quality that ensures software by the standard software process, and boost productivity, in the modern concepts of quality management, process, people and technology are 3 key factor (Chrissis MB that ensure software quality, 2003), the implementation detail of software process is determining the quality of software, improving software quality by the management that improves software process is an important channel (Ge Jidong, Lu builds, 2008).Therefore, need a kind of method, estimate the credibility of software, and find the problem that exists in the software development process according to software trust degree level by software development process.But the method for the confidence level of software can not estimated according to the software process attribute data by a system at present.
Summary of the invention
In order to address the above problem, the object of the present invention is to provide a software trust property detection system and a method based on the software process achievement data, be used for the software credibility that the software process of appointment produces is detected and draw grade, with the management and the improvement of guiding software process, finally obtain the software of high confidence level.
Technical scheme of the present invention is:
A kind of software credibility detection method may further comprise the steps:
1) trusted software standard index system management module is selected the software process assessment indicator system and the software trust assessment indicator system of standard according to Characteristic of Software, obtains specific software process evaluation index and software trust evaluation index;
2) the software process data acquisition module is according to the software process evaluation index of step 1) selection, acquisition software process real data;
3) the software trust degree is estimated module and is set up mapping model between software process data and the software trust data, and provide the software trust degrees of data, utilize data in the history item to the model training, under the setting range that error satisfies, obtain corresponding weight coefficient, software process real data input model with gathering calculates the software trust degree;
4) the software credibility detection module draws the credibility of software according to the standard software confidence level.
The software process assessment indicator system of described step 1) standard and software trust assessment indicator system draw according to document analysis and industry survey analytic statistics.
Described step 2) the software process real data comprises data and quantitative data qualitatively.
Described step 3) mapping model is the T-S neural network model.
The setting range that described step 3) error satisfies is smaller or equal to 10
-6
Before the software process real data input model of described step 3) with collection:
To data quantification qualitatively, be specially: what comprise in the data qualitatively is poor, general, better, good, fine, quantitatively is 0.2,0.4,0.6,0.8,1.0;
Implement just to get to operate for the reverse achievement data that belongs in the software process assessment indicator system, be specially:
The reverse achievement data of index forward value=1-.
Described step 4) standard confidence level is divided into five confidence levels: 0~0.3 for extremely insincere, 0.3~0.5 for insincere, 0.5~0.7 for credible substantially, 0.7~0.9 for credible, 0.9~1.0 for the height credible.
Described step 4) obtains the confidence levels of this software by the confidence value and the contrast of software trust degree standard value of software.
A kind of software trust level detection system is characterized in that, comprises that trusted software standard index system management module, software process data acquisition module, software trust degree estimate module, software trust degree level detecting module, wherein:
Described trusted software standard index system management module is selected the software process assessment indicator system and the software trust index system of standard according to Characteristic of Software, obtains specific software process evaluation index and software trust evaluation index;
Described software process data acquisition module is according to the software process evaluation index of selecting, acquisition software process real data;
The software trust degree is estimated module and is set up a neural network model, utilize software process data in the history item, software trust data and software trust degrees of data to the model training, under the setting range that error satisfies, obtain corresponding weight coefficient, software process real data input model with gathering calculates the software trust degree;
Software trust degree level detecting module according to the confidence level contrast of software trust degree and standard, is differentiated the confidence level of this software.
Described software process data acquisition module also comprises a software process database, and the software process deposit data of collection is in software process database.
Compared with prior art, the invention has the beneficial effects as follows:
1) detects the confidence level of software according to software development process, software reach the standard grade use before, can estimate the confidence level of software according to the real data of software process exploitation, grasp the defective of software in advance, guarantee the credibility of software, reach the purpose that prevents trouble before it happens;
2) different software organizations have different characteristics, and effective cutting of software process assessment indicator system is suitable for different software organizations;
3) the T-S network model of Gou Jianing helps the qualitative index quantification is handled, and makes that to estimate the result more accurate;
4) standardized management of data acquisition module and data helps software organization to form the trusted software managerial knowledge storehouse with this tissue signature through long-term accumulation;
5) quantitative software creditability measurement grade classification has been avoided the fuzzy uncertain and the subjectivity of artificial judgement.
Description of drawings
Fig. 1 software credibility testing process figure
Fig. 2 software credibility detects T-S neural network model structural drawing
Embodiment
Below in conjunction with the drawings and specific embodiments the present invention is described in further detail:
In described software trust property detection system, whole detection system is divided into four modules: trusted software standard index system management module, software process data acquisition module, software trust degree are estimated module, software trust degree level detecting module.Concrete testing process, as shown in Figure 1.
The standard index item that described trusted software standard index system management module is mainly set up, revised, preservation, query software process and software trust are estimated, and generate the performance history of specific software and the evaluation index item of software trust; According to existing document analysis and software enterprise's investigation statistics are analyzed, determine assessment indicator system from two dimensions, on procedure incarnation, process behavior, process product and quality is credible, cost is credible, progress is credible two dimensions.Therefore, as shown in table 1 in standard index system management module settings software process assessment indicator system, and the standard index system of software trust evaluation, as shown in table 2; According to the attributive character of detailed programs, can carry out cutting (selection meets the index item of specific project) to each index system, obtain being used for the index item of trusted software measure model.
Table 1 software process assessment indicator system
Table 2 software trust assessment indicator system
Described software process data acquisition module is finished the work such as typing, modification, preservation, inquiry and deletion of software process metric data according to the specific indexes item; Because the process measurement data had both comprised qualitative data, comprise quantitative data again, according to the requirement of model at first with the qualitative data quantification, form with standard deposits software process database in, for example: what comprise in the qualitative data is poor, general, better, good, fine, quantitatively is 0.2,0.4,0.6,0.8,1.0.
Described software trust degree is estimated module, is based on the measure model of T-S neural network, and input end is the software process data, and output terminal is the confidence level desired value of software.As shown in Figure 2, the operation of model is carried out in two steps, at first collect the history entries destination data of software development company, comprise software process data, software trust data and software trust degrees of data, these data of utilizing history item are to the model training, satisfy (ε≤10 under the condition of certain limit in error
-6Or iteration is moved 300 times), obtain corresponding weight coefficient (ω
11~ω
N6, ω
Y1~ω
Y6); Secondly, for gathering specific software process real data,, estimate the confidence level of this software as the input data of model.
For a specific software organization, weight coefficient (ω
11~ω
N6, ω
Y1~ω
Y6) be not unalterable, along with software organization's development project increases, tissue can be adjusted weight coefficient at any time and be fit to organize the software credibility of particular requirement to detect to reach.
The mapping relations of software process index item and software trust evaluation index item:
The software trust degree:
Described software trust degree level detecting module according to the confidence level contrast of software trust degree (z) and standard, is differentiated the confidence level of this software.
The present invention will be further described below by the embodiment to a development project of certain software company, but be not construed as limiting the invention.
The first step, at the feature of this software project, cutting standard software process index system obtains this software process assessment indicator system, and is as shown in table 3.
Table 3 software process evaluation index metric
Second step, obtain the metric data of this software process, the weight coefficient of considering the T-S network all get on the occasion of, implement just to get to operate for the reverse index in the index system, then constant for the forward index, just belong to reverse index as " milestone schedule variance ", promptly " milestone schedule variance " is more little, and then software is just credible more, and vice versa, therefore, need just get and operate " milestone schedule variance ":
Index forward value=1-milestone schedule variance
For reverse evaluation index, all to just get and operate.
The 3rd step, according to the historical data training T-S of software organization network, obtain each link weight coefficients, see Table 4
Table 4 software process evaluation index weight
The 4th step, according to software process evaluation index weight and software trust factor value, estimate the confidence level of software, see Table 5.
Table 5 software trust degree measure value
In the 5th step, detect software trust degree level.The confidence level of this software is 0.822, according to the standard confidence level: extremely insincere (0~0.3), insincere (〉=0.3~0.5), credible substantially (〉=0.5~0.7), credible (〉=0.7~0.9), high credible (〉=0.9~1.0) then can obtain this software trust level and be " credible ".
Claims (10)
1. software credibility detection method may further comprise the steps:
1) trusted software standard index system management module is selected the software process assessment indicator system and the software trust assessment indicator system of standard according to Characteristic of Software, obtains specific software process evaluation index and software trust evaluation index;
2) the software process data acquisition module is according to the software process evaluation index of step 1) selection, acquisition software process real data;
3) the software trust degree is estimated module and is set up mapping model between software process data and the software trust data, and provide the software trust degrees of data, utilize data in the history item to the model training, under the setting range that error satisfies, obtain corresponding weight coefficient, software process real data input model with gathering calculates the software trust degree;
4) the software credibility detection module draws the credibility of software according to the standard software confidence level.
2. the method for claim 1 is characterized in that, the software process assessment indicator system of described step 1) standard and software trust assessment indicator system draw according to document analysis and industry survey analytic statistics.
3. the method for claim 1 is characterized in that, described step 2) the software process real data comprises data and quantitative data qualitatively.
4. the method for claim 1 is characterized in that, described step 3) neural network model is the T-S neural network model.
5. the method for claim 1 is characterized in that, the setting range that described step 3) error satisfies is smaller or equal to 10
-6
6. the method for claim 1 is characterized in that, before the software process real data input model of described step 3) with collection:
To data quantification qualitatively, be specially: what comprise in the data qualitatively is poor, general, better, good, fine, quantitatively is 0.2,0.4,0.6,0.8,1.0;
Implement just to get to operate for the reverse achievement data that belongs in the software process assessment indicator system, be specially:
The reverse achievement data of index forward value=1-.
7. the method for claim 1, it is characterized in that described step 4) standard confidence level is divided into five confidence levels: 0~0.3 for extremely insincere, 0.3~0.5 for insincere, 0.5~0.7 for credible substantially, 0.7~0.9 for credible, 0.9~1.0 for the height credible.
8. the method for claim 1 is characterized in that, described step 4) obtains the confidence levels of this software by the confidence value and the contrast of software trust degree standard value of software.
9. a software trust property detection system is characterized in that, comprises that trusted software standard index system management module, software process data acquisition module, software trust degree estimate module, software credibility detection module, wherein:
Described trusted software standard index system management module is selected the software process assessment indicator system and the software trust index system of standard according to Characteristic of Software, obtains specific software process evaluation index and software trust evaluation index;
Described software process data acquisition module is according to the software process evaluation index of selecting, acquisition software process real data;
The software trust degree is estimated module and is set up a neural network model, utilize software process data in the history item, software trust data and software trust degrees of data to the model training, under the setting range that error satisfies, obtain corresponding weight coefficient, software process real data input model with gathering calculates the software trust degree;
Software trust degree level detecting module according to the confidence level contrast of software trust degree and standard, is differentiated the confidence level of this software.
10. system as claimed in claim 9 is characterized in that, described software process data acquisition module also comprises a software process database, and the software process deposit data of collection is in software process database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910242716A CN101710306A (en) | 2009-12-15 | 2009-12-15 | Method and system for detecting software reliability |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910242716A CN101710306A (en) | 2009-12-15 | 2009-12-15 | Method and system for detecting software reliability |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101710306A true CN101710306A (en) | 2010-05-19 |
Family
ID=42403098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910242716A Pending CN101710306A (en) | 2009-12-15 | 2009-12-15 | Method and system for detecting software reliability |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101710306A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102253886A (en) * | 2011-06-17 | 2011-11-23 | 北京大学 | Software credibility requirement extraction method based on control use cases |
CN102662930A (en) * | 2012-04-16 | 2012-09-12 | 乐山师范学院 | Corpus tagging method and corpus tagging device |
CN103336737A (en) * | 2012-03-22 | 2013-10-02 | 国际商业机器公司 | Software portfolio management method and system based on feature usage |
CN103840955A (en) * | 2012-11-22 | 2014-06-04 | 中国银联股份有限公司 | Operation maintenance system of distributed IT system, and operation maintenance management method thereof |
CN104008057A (en) * | 2014-06-13 | 2014-08-27 | 国家电网公司 | Code safety evaluating method based on defect analysis |
CN104572433A (en) * | 2013-10-29 | 2015-04-29 | 中国银联股份有限公司 | Method and device for testing financial information system |
CN104636258A (en) * | 2015-03-13 | 2015-05-20 | 上海交通大学 | Confidence testing method facing reconfigurable support software |
CN105184170A (en) * | 2015-09-21 | 2015-12-23 | 吉林大学 | Domain-specific software credibility evaluating method based on formalization degree |
CN105260296A (en) * | 2015-09-14 | 2016-01-20 | 桂林电子科技大学 | Dynamic conversion method for time multi-stack push-down network |
CN105260295A (en) * | 2015-09-14 | 2016-01-20 | 桂林电子科技大学 | Static conversion method for time multi-stack push-down network |
CN106598844A (en) * | 2016-11-17 | 2017-04-26 | 努比亚技术有限公司 | Mobile terminal and method for calculating code defect rate of mobile terminal |
CN103995770B (en) * | 2014-05-13 | 2017-05-24 | 北京荣之联科技股份有限公司 | System management monitoring method and device |
CN108804278A (en) * | 2017-05-04 | 2018-11-13 | 苏州睿途网络科技有限公司 | A kind of software monitors system and its business model |
CN110428333A (en) * | 2019-08-01 | 2019-11-08 | 上海爱富爱克斯网络科技发展有限责任公司 | For the Data Detection and analysis method of financial intermediary MT4 foreign exchange transaction software |
CN112463591A (en) * | 2020-11-12 | 2021-03-09 | 武汉市农业科学院 | Agricultural Internet of things system evaluation method, device, equipment and storage medium |
CN114816963A (en) * | 2022-06-28 | 2022-07-29 | 南昌航空大学 | Embedded software quality evaluation method, system, computer and readable storage medium |
-
2009
- 2009-12-15 CN CN200910242716A patent/CN101710306A/en active Pending
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102253886A (en) * | 2011-06-17 | 2011-11-23 | 北京大学 | Software credibility requirement extraction method based on control use cases |
CN102253886B (en) * | 2011-06-17 | 2013-12-04 | 北京大学 | Software credibility requirement extraction method based on control use cases |
CN103336737B (en) * | 2012-03-22 | 2016-12-28 | 国际商业机器公司 | Information handling systems and the method for enforcement thereof |
CN103336737A (en) * | 2012-03-22 | 2013-10-02 | 国际商业机器公司 | Software portfolio management method and system based on feature usage |
CN102662930B (en) * | 2012-04-16 | 2015-04-22 | 乐山师范学院 | Corpus tagging method and corpus tagging device |
CN102662930A (en) * | 2012-04-16 | 2012-09-12 | 乐山师范学院 | Corpus tagging method and corpus tagging device |
CN103840955A (en) * | 2012-11-22 | 2014-06-04 | 中国银联股份有限公司 | Operation maintenance system of distributed IT system, and operation maintenance management method thereof |
CN103840955B (en) * | 2012-11-22 | 2017-10-03 | 中国银联股份有限公司 | The operation maintenance system and operation maintenance management method of distributed IT system |
CN104572433A (en) * | 2013-10-29 | 2015-04-29 | 中国银联股份有限公司 | Method and device for testing financial information system |
CN104572433B (en) * | 2013-10-29 | 2017-09-29 | 中国银联股份有限公司 | A kind of financial information system method of testing and device |
CN103995770B (en) * | 2014-05-13 | 2017-05-24 | 北京荣之联科技股份有限公司 | System management monitoring method and device |
CN104008057A (en) * | 2014-06-13 | 2014-08-27 | 国家电网公司 | Code safety evaluating method based on defect analysis |
CN104636258A (en) * | 2015-03-13 | 2015-05-20 | 上海交通大学 | Confidence testing method facing reconfigurable support software |
CN104636258B (en) * | 2015-03-13 | 2018-03-06 | 上海交通大学 | Towards the credible method of testing of restructural support programs |
CN105260296A (en) * | 2015-09-14 | 2016-01-20 | 桂林电子科技大学 | Dynamic conversion method for time multi-stack push-down network |
CN105260295A (en) * | 2015-09-14 | 2016-01-20 | 桂林电子科技大学 | Static conversion method for time multi-stack push-down network |
CN105260295B (en) * | 2015-09-14 | 2018-09-25 | 桂林电子科技大学 | It pushes net under time multiple stack the static conversion method of network |
CN105184170A (en) * | 2015-09-21 | 2015-12-23 | 吉林大学 | Domain-specific software credibility evaluating method based on formalization degree |
CN106598844A (en) * | 2016-11-17 | 2017-04-26 | 努比亚技术有限公司 | Mobile terminal and method for calculating code defect rate of mobile terminal |
CN106598844B (en) * | 2016-11-17 | 2020-07-31 | 南京博雅区块链研究院有限公司 | Mobile terminal and calculation method based on mobile terminal code defect rate |
CN108804278A (en) * | 2017-05-04 | 2018-11-13 | 苏州睿途网络科技有限公司 | A kind of software monitors system and its business model |
CN110428333A (en) * | 2019-08-01 | 2019-11-08 | 上海爱富爱克斯网络科技发展有限责任公司 | For the Data Detection and analysis method of financial intermediary MT4 foreign exchange transaction software |
CN112463591A (en) * | 2020-11-12 | 2021-03-09 | 武汉市农业科学院 | Agricultural Internet of things system evaluation method, device, equipment and storage medium |
CN114816963A (en) * | 2022-06-28 | 2022-07-29 | 南昌航空大学 | Embedded software quality evaluation method, system, computer and readable storage medium |
CN114816963B (en) * | 2022-06-28 | 2022-09-20 | 南昌航空大学 | Embedded software quality evaluation method, system, computer and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101710306A (en) | Method and system for detecting software reliability | |
EP2920660B1 (en) | Assessment of power system equipment for equipment maintenance and/or risk mitigation | |
CN109815704B (en) | Safety detection method and system for Kubernetes cloud native application | |
Yu et al. | Experience in predicting fault-prone software modules using complexity metrics | |
CN107704992A (en) | The method and device of transmission line lightning stroke risk assessment | |
US20130167113A1 (en) | Maintenance of a subroutine repository for an application under test based on subroutine usage information | |
CN114065223A (en) | Multi-dimensional software security risk assessment method based on CVSS | |
CN102591773A (en) | Automatic evaluation method for operation system security in classified protection evaluation and system thereof | |
CN116467674B (en) | Intelligent fault processing fusion updating system and method for power distribution network | |
CN103020737A (en) | Forecasting method of baking sheet smoke | |
CN110781612A (en) | Fault diagnosis method and device for ball screw, computer device and storage medium | |
CN115080379A (en) | Method for evaluating software test effectiveness in multiple dimensions | |
CN117391534A (en) | Construction quality monitoring method and device, electronic equipment and storage medium | |
CN104699595A (en) | Software testing method facing to software upgrading | |
CN115994363A (en) | Block chain security assessment method and device based on multidimensional security detection | |
CN115204733A (en) | Data auditing method and device, electronic equipment and storage medium | |
CN117390767B (en) | Reliability evaluation method, device and system for aviation onboard electronic equipment and medium | |
Xie et al. | Optimum prioritisation and resource allocation based on fault tree analysis | |
CN101714190B (en) | Role diagnostic system for bridge structural state | |
Tamura et al. | Deep learning based on fine tuning with application to the reliability assessment of similar open source software | |
Silva et al. | Towards making safety-critical systems safer: learning from mistakes | |
CN106685926A (en) | Information system security level evaluation method and system | |
Wright et al. | Transfer standard uncertainty can cause inconclusive inter-laboratory comparisons | |
Yi et al. | Impacts of networking effects on software reliability growth processes: a multi‐attribute utility theory approach | |
CN115499164A (en) | Multi-feature fusion block chain intelligent contract vulnerability detection method and device based on graph neural network, computer and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20100519 |