Threat modeling in cloud computing-a literature review
Cloud computing has significantly changed the operational models of companies. This
adoption has consequently caused impact on security, resulting in a wider attack surface …
adoption has consequently caused impact on security, resulting in a wider attack surface …
Vulnerability discovery with attack injection
The increasing reliance put on networked computer systems demands higher levels of
dependability. This is even more relevant as new threats and forms of attack are constantly …
dependability. This is even more relevant as new threats and forms of attack are constantly …
Vulnerability scanning with Google cloud platform
NJ Mitchell, K Zunnurhain - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Cloud is completely flipping the concept of business nowadays. Reducing capital and
operational expenditure to a great extent already drew attention of big companies and …
operational expenditure to a great extent already drew attention of big companies and …
Representativeness in the Benchmark for Vulnerability Analysis Tools ({{{{{B-VAT}}}}})
K Afanador, C Irvine - 13th USENIX Workshop on Cyber Security …, 2020 - usenix.org
A variety of tools are used to support software vulnerability analysis processes. However,
when analysts want to select the optimal tool for a particular use case, or attempt to compare …
when analysts want to select the optimal tool for a particular use case, or attempt to compare …
An extensive comparison of static application security testing tools
M Esposito, V Falaschi, D Falessi - arXiv preprint arXiv:2403.09219, 2024 - arxiv.org
Context: Static Application Security Testing Tools (SASTTs) identify software vulnerabilities
to support the security and reliability of software applications. Interestingly, several studies …
to support the security and reliability of software applications. Interestingly, several studies …
Licality—likelihood and criticality: Vulnerability risk prioritization through logical reasoning and deep learning
Security and risk assessment aims to prioritize detected vulnerabilities for remediation in a
computer networking system. The widely used expert-based risk prioritization approach, eg …
computer networking system. The widely used expert-based risk prioritization approach, eg …
Predicting vulnerability type in common vulnerabilities and exposures (cve) database with machine learning classifiers
V Yosifova, A Tasheva… - 2021 12th National …, 2021 - ieeexplore.ieee.org
Vulnerability type is not part of the standard CVE scheme so the ability to determine it only
on the basis of text description would be a very useful for automated vulnerability handling …
on the basis of text description would be a very useful for automated vulnerability handling …
Advancing Software Vulnerability Scoring: A Statistical Approach with Machine Learning Techniques and GridSearchCV Parameter Tuning
BK Verma, AK Yadav - SN Computer Science, 2024 - Springer
The growing complexity, diversity, and importance of software pose a significant threat to
computer system security due to exploitable software vulnerabilities. Important infrastructure …
computer system security due to exploitable software vulnerabilities. Important infrastructure …
[PDF][PDF] Environmental Aware Vulnerability Scoring.
A Eitel - IoTBDS, 2020 - scitepress.org
When assessing the CVSS value of a vulnerability, the Environmental Metrics are often
ignored. There are several reasons for this. However, this score is essential for the …
ignored. There are several reasons for this. However, this score is essential for the …
Machine Learning Approaches for Security Detection in Cloud Web Applications
P Vyas, GL Bhavani, N Gairola… - 2023 3rd …, 2023 - ieeexplore.ieee.org
A technology architecture known as" cloud computing" offers end users on-demand,
scalable, & measurable resources. Today's businesses rely heavily on computational …
scalable, & measurable resources. Today's businesses rely heavily on computational …