2020
DOI: 10.1016/j.infsof.2019.106233
|View full text |Cite
|
Sign up to set email alerts
|

Software trustworthiness evaluation model based on a behaviour trajectory matrix

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…They also have conducted numerous experiments in a large-scale real QoS datasets, and the experimental results demonstrate the effectiveness of their method. Tian et al build a software trustworthiness evaluation model based on a behavior trajectory matrix [15]. Checkpoints are set in the software behavior trajectory, and binary code is introduced to represent the software behavior trajectory tree.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They also have conducted numerous experiments in a large-scale real QoS datasets, and the experimental results demonstrate the effectiveness of their method. Tian et al build a software trustworthiness evaluation model based on a behavior trajectory matrix [15]. Checkpoints are set in the software behavior trajectory, and binary code is introduced to represent the software behavior trajectory tree.…”
Section: Related Workmentioning
confidence: 99%
“…The essence of this method is to predict the trustworthiness of attributes according to the internal attribute values. Typical models for the synthesis of trustworthy attribute values include machine learning [11][12][13][14][15], axiomatic approaches [16][17][18][19][20], uncertainty theory [21][22][23][24], system testing [25], the social-to-software framework [26], user feedback [27], heuristic-systematic processing [28], the development framework [29], crowd wisdom [30], etc.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, scholars have achieved many research results in the measurement of software security and credibility. From software requirement [24], behavior [25,26], capability [27], and software development process [28], software credibility analysis, modeling, and measurement are carried out. e method of multiattribute decision making is widely used in engineering, technology, and economy and is also used in software credibility analysis [29,30].…”
Section: Related Workmentioning
confidence: 99%
“…It is essential and necessary to evaluate software trustworthiness based on the influence degrees of different software behaviors for minimizing the interference of human factors. Tian et al [109] constructed behaviour trajectory matrices to represent the behaviour trajectory and then trained the deep residual network (ResNet) as a software trustworthiness evaluation model to classify the current software behaviors. After that, they used the cosine similarity algorithm to calculate the deviation degree of the software behavior trajectory.…”
Section: Software Maintenancementioning
confidence: 99%