Software vulnerability discovery techniques: A survey

B Liu, L Shi, Z Cai, M Li - 2012 fourth international conference …, 2012 - ieeexplore.ieee.org
Software vulnerabilities are the root cause of computer security problem. How people can
quickly discover vulnerabilities existing in a certain software has always been the focus of …

[HTML][HTML] Systematic review of web application security vulnerabilities detection methods

S Rafique, M Humayun, Z Gul, A Abbas… - Journal of Computer and …, 2015 - scirp.org
In recent years, web security has been viewed in the context of securing the web application
layer from attacks by unauthorized users. The vulnerabilities existing in the web application …

Web application security vulnerabilities detection approaches: A systematic mapping study

S Rafique, M Humayun, B Hamid… - 2015 IEEE/ACIS …, 2015 - ieeexplore.ieee.org
Number of security vulnerabilities in web application has grown with the tremendous growth
of web application in last two decades. As the domain of Web Applications is maturing, large …

Time series modeling of vulnerabilities

Y Roumani, JK Nwankpa, YF Roumani - Computers & Security, 2015 - Elsevier
Vulnerability prediction models forecast future vulnerabilities and can be used to assess
security risks and estimate the resources needed for handling potential security breaches …

[PDF][PDF] Defining and assessing quantitative security risk measures using vulnerability lifecycle and cvss metrics

HC Joh, YK Malaiya - The 2011 international conference on security and …, 2011 - Citeseer
Known vulnerabilities which have been discovered but not patched represents a security
risk which can lead to considerable financial damage or loss of reputation. They include …

[PDF][PDF] Software vulnerability markets: Discoverers and buyers

AM Algarni, YK Malaiya - International Journal of Computer and …, 2014 - academia.edu
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have
received some attention recently. However, the role of interaction among the vulnerability …

An empirical methodology to evaluate vulnerability discovery models

F Massacci, VH Nguyen - IEEE Transactions on Software …, 2014 - ieeexplore.ieee.org
Vulnerability discovery models (VDMs) operate on known vulnerability data to estimate the
total number of vulnerabilities that will be reported after a software is released. VDMs have …

Time between vulnerability disclosures: A measure of software product vulnerability

P Johnson, D Gorton, R Lagerström, M Ekstedt - Computers & Security, 2016 - Elsevier
Time between vulnerability disclosure (TBVD) for individual analysts is proposed as a
meaningful measure of the likelihood of finding a zero-day vulnerability within a given …

Characterization and classification of malicious Web traffic

K Goseva-Popstojanova, G Anastasovski… - Computers & …, 2014 - Elsevier
Web systems commonly face unique set of vulnerabilities and security threats due to their
high exposure, access by browsers, and integration with databases. This study is focused on …

Time series forecast modeling of vulnerabilities in the android operating system using ARIMA and deep learning methods

K Gencer, F Başçiftçi - Sustainable Computing: Informatics and Systems, 2021 - Elsevier
Security vulnerability prediction models allow estimation of the number of potential
vulnerabilities and evaluation of the risks caused by these vulnerabilities. In particular, for …