Automated characterization of software vulnerabilities
D Gonzalez, H Hastings… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Preventing vulnerability exploits is a critical software maintenance task, and software
engineers often rely on Common Vulnerability and Exposure (CVEs) reports for information …
engineers often rely on Common Vulnerability and Exposure (CVEs) reports for information …
Cloudsafe: A tool for an automated security analysis for cloud computing
S An, T Eom, JS Park, JB Hong… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
Cloud computing has been adopted widely, providing on-demand computing resources to
improve performance and reduce operational costs. However, these new functionalities also …
improve performance and reduce operational costs. However, these new functionalities also …
Application of quantitative security metrics in cloud computing
Security issues are still prevalent in cloud computing particularly public cloud. Efforts by
Cloud Service Providers to secure out-sourced resources are not sufficient to gain trust from …
Cloud Service Providers to secure out-sourced resources are not sufficient to gain trust from …
Threat modeling and analysis for the cloud ecosystem
As the usage of the Cloud proliferates, the need for security evaluation of the Cloud also
grows. The process of threat modeling and analysis is advocated to assess potential …
grows. The process of threat modeling and analysis is advocated to assess potential …
VUDENC: vulnerability detection with deep learning on a natural codebase for Python
Context: Identifying potential vulnerable code is important to improve the security of our
software systems. However, the manual detection of software vulnerabilities requires expert …
software systems. However, the manual detection of software vulnerabilities requires expert …
Managing publicly known security vulnerabilities in software systems
H Mahrous, B Malhotra - … on privacy, security and trust (PST), 2018 - ieeexplore.ieee.org
Monitoring security vulnerabilities (weaknesses in software systems) is very important for
organizations. Third parties such as National Institute of Standards and Technology (NIST) …
organizations. Third parties such as National Institute of Standards and Technology (NIST) …
Cyber security vulnerability detection using natural language processing
K Singh, SS Grover, RK Kumar - 2022 IEEE world AI IoT …, 2022 - ieeexplore.ieee.org
Cybersecurity is the practice of preventing cyberattacks on vital infrastructure and private
data. Government organisations, banks, hospitals, and every other industry sector are …
data. Government organisations, banks, hospitals, and every other industry sector are …
A Continuous Risk Assessment Methodology for Cloud Infrastructures
Cloud systems are dynamic environments which make it difficult to keep track of security
risks that resources are exposed to. Traditionally, risk assessment is conducted for individual …
risks that resources are exposed to. Traditionally, risk assessment is conducted for individual …
Towards scalable automated vulnerability scanning & exploitation
JA Booz - 2020 - search.proquest.com
Offensive security assessments, where expert hackers attack a network to document
vulnerabilities that can be exploited, are one way to approach network security. These …
vulnerabilities that can be exploited, are one way to approach network security. These …
Summarizing vulnerabilities' descriptions to support experts during vulnerability assessment activities
ER Russo, A Di Sorbo, CA Visaggio… - Journal of Systems and …, 2019 - Elsevier
Vulnerabilities affecting software and systems have to be promptly fixed, to prevent
violations to integrity, availability and confidentiality policies of targeted organizations. Once …
violations to integrity, availability and confidentiality policies of targeted organizations. Once …