Predicting vulnerable software components
S Neuhaus, T Zimmermann, C Holler… - Proceedings of the 14th …, 2007 - dl.acm.org
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines
existing vulnerability databases and version archives to map past vulnerabilities to …
existing vulnerability databases and version archives to map past vulnerabilities to …
Measuring, analyzing and predicting security vulnerabilities in software systems
In this work we examine the feasibility of quantitatively characterizing some aspects of
security. In particular, we investigate if it is possible to predict the number of vulnerabilities …
security. In particular, we investigate if it is possible to predict the number of vulnerabilities …
Dependability analysis of safety critical systems: Issues and challenges
R kamal Kaur, B Pandey, LK Singh - Annals of nuclear energy, 2018 - Elsevier
Safety critical systems progressively used in domains such as nuclear power, transport,
medical and information systems are often concerned with a formal process of dependability …
medical and information systems are often concerned with a formal process of dependability …
High performance connected digit recognition using hidden Markov models
LR Rabiner, JG Wilpon… - IEEE Transactions on …, 1989 - ieeexplore.ieee.org
The authors use an enhanced analysis feature set consisting of both instantaneous and
transitional spectral information and test the hidden-Markov-model (HMM)-based connected …
transitional spectral information and test the hidden-Markov-model (HMM)-based connected …
Design and implementation of a secure modbus protocol
The interconnectivity of modern and legacy supervisory control and data acquisition
(SCADA) systems with corporate networks and the Internet has significantly increased the …
(SCADA) systems with corporate networks and the Internet has significantly increased the …
Improving CVSS-based vulnerability prioritization and response with context information
C Fruhwirth, T Mannisto - 2009 3rd International symposium on …, 2009 - ieeexplore.ieee.org
The growing number of software security vulnerabilities is an ever-increasing challenge for
organizations. As security managers in the industry have to operate within limited budgets …
organizations. As security managers in the industry have to operate within limited budgets …
Modeling the vulnerability discovery process
OH Alhazmi, YK Malaiya - 16th IEEE International Symposium …, 2005 - ieeexplore.ieee.org
Security vulnerabilities in servers and operating systems are software defects that represent
great risks. Both software developers and users are struggling to contain the risk posed by …
great risks. Both software developers and users are struggling to contain the risk posed by …
Characterizing data sharing in civil infrastructure engineering: Current practice, future vision, barriers, and promotion strategies
Data sharing between different organizations is critical in supporting decision making in civil
infrastructure engineering projects (eg, transportation projects). Understanding the …
infrastructure engineering projects (eg, transportation projects). Understanding the …
Combining software metrics and text features for vulnerable file prediction
In recent years, to help developers reduce time and effort required to build highly secure
software, a number of prediction models which are built on different kinds of features have …
software, a number of prediction models which are built on different kinds of features have …
Forecasting IT security vulnerabilities–An empirical analysis
Today, organizations must deal with a plethora of IT security threats and to ensure smooth
and uninterrupted business operations, firms are challenged to predict the volume of IT …
and uninterrupted business operations, firms are challenged to predict the volume of IT …