Threat modeling in cloud computing-a literature review

M Kharma, A Taweel - International Conference on Ubiquitous Security, 2022 - Springer
Cloud computing has significantly changed the operational models of companies. This
adoption has consequently caused impact on security, resulting in a wider attack surface …

Vulnerability discovery with attack injection

J Antunes, N Neves, M Correia… - IEEE Transactions …, 2010 - ieeexplore.ieee.org
The increasing reliance put on networked computer systems demands higher levels of
dependability. This is even more relevant as new threats and forms of attack are constantly …

Vulnerability scanning with Google cloud platform

NJ Mitchell, K Zunnurhain - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Cloud is completely flipping the concept of business nowadays. Reducing capital and
operational expenditure to a great extent already drew attention of big companies and …

Representativeness in the Benchmark for Vulnerability Analysis Tools ({{{{{B-VAT}}}}})

K Afanador, C Irvine - 13th USENIX Workshop on Cyber Security …, 2020 - usenix.org
A variety of tools are used to support software vulnerability analysis processes. However,
when analysts want to select the optimal tool for a particular use case, or attempt to compare …

An extensive comparison of static application security testing tools

M Esposito, V Falaschi, D Falessi - arXiv preprint arXiv:2403.09219, 2024 - arxiv.org
Context: Static Application Security Testing Tools (SASTTs) identify software vulnerabilities
to support the security and reliability of software applications. Interestingly, several studies …

Licality—likelihood and criticality: Vulnerability risk prioritization through logical reasoning and deep learning

Z Zeng, Z Yang, D Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security and risk assessment aims to prioritize detected vulnerabilities for remediation in a
computer networking system. The widely used expert-based risk prioritization approach, eg …

Predicting vulnerability type in common vulnerabilities and exposures (cve) database with machine learning classifiers

V Yosifova, A Tasheva… - 2021 12th National …, 2021 - ieeexplore.ieee.org
Vulnerability type is not part of the standard CVE scheme so the ability to determine it only
on the basis of text description would be a very useful for automated vulnerability handling …

Advancing Software Vulnerability Scoring: A Statistical Approach with Machine Learning Techniques and GridSearchCV Parameter Tuning

BK Verma, AK Yadav - SN Computer Science, 2024 - Springer
The growing complexity, diversity, and importance of software pose a significant threat to
computer system security due to exploitable software vulnerabilities. Important infrastructure …

[PDF][PDF] Environmental Aware Vulnerability Scoring.

A Eitel - IoTBDS, 2020 - scitepress.org
When assessing the CVSS value of a vulnerability, the Environmental Metrics are often
ignored. There are several reasons for this. However, this score is essential for the …

Machine Learning Approaches for Security Detection in Cloud Web Applications

P Vyas, GL Bhavani, N Gairola… - 2023 3rd …, 2023 - ieeexplore.ieee.org
A technology architecture known as" cloud computing" offers end users on-demand,
scalable, & measurable resources. Today's businesses rely heavily on computational …