Automated characterization of software vulnerabilities

D Gonzalez, H Hastings… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Preventing vulnerability exploits is a critical software maintenance task, and software
engineers often rely on Common Vulnerability and Exposure (CVEs) reports for information …

Cloudsafe: A tool for an automated security analysis for cloud computing

S An, T Eom, JS Park, JB Hong… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
Cloud computing has been adopted widely, providing on-demand computing resources to
improve performance and reduce operational costs. However, these new functionalities also …

Application of quantitative security metrics in cloud computing

KA Torkura, F Cheng, C Meinel - 2015 10th International …, 2015 - ieeexplore.ieee.org
Security issues are still prevalent in cloud computing particularly public cloud. Efforts by
Cloud Service Providers to secure out-sourced resources are not sufficient to gain trust from …

Threat modeling and analysis for the cloud ecosystem

S Manzoor, H Zhang, N Suri - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
As the usage of the Cloud proliferates, the need for security evaluation of the Cloud also
grows. The process of threat modeling and analysis is advocated to assess potential …

VUDENC: vulnerability detection with deep learning on a natural codebase for Python

L Wartschinski, Y Noller, T Vogel, T Kehrer… - Information and …, 2022 - Elsevier
Context: Identifying potential vulnerable code is important to improve the security of our
software systems. However, the manual detection of software vulnerabilities requires expert …

Managing publicly known security vulnerabilities in software systems

H Mahrous, B Malhotra - … on privacy, security and trust (PST), 2018 - ieeexplore.ieee.org
Monitoring security vulnerabilities (weaknesses in software systems) is very important for
organizations. Third parties such as National Institute of Standards and Technology (NIST) …

Cyber security vulnerability detection using natural language processing

K Singh, SS Grover, RK Kumar - 2022 IEEE world AI IoT …, 2022 - ieeexplore.ieee.org
Cybersecurity is the practice of preventing cyberattacks on vital infrastructure and private
data. Government organisations, banks, hospitals, and every other industry sector are …

A Continuous Risk Assessment Methodology for Cloud Infrastructures

I Kunz, A Schneider, C Banse - 2022 22nd IEEE International …, 2022 - ieeexplore.ieee.org
Cloud systems are dynamic environments which make it difficult to keep track of security
risks that resources are exposed to. Traditionally, risk assessment is conducted for individual …

Towards scalable automated vulnerability scanning & exploitation

JA Booz - 2020 - search.proquest.com
Offensive security assessments, where expert hackers attack a network to document
vulnerabilities that can be exploited, are one way to approach network security. These …

Summarizing vulnerabilities' descriptions to support experts during vulnerability assessment activities

ER Russo, A Di Sorbo, CA Visaggio… - Journal of Systems and …, 2019 - Elsevier
Vulnerabilities affecting software and systems have to be promptly fixed, to prevent
violations to integrity, availability and confidentiality policies of targeted organizations. Once …