Software vulnerability discovery techniques: A survey
B Liu, L Shi, Z Cai, M Li - 2012 fourth international conference …, 2012 - ieeexplore.ieee.org
Software vulnerabilities are the root cause of computer security problem. How people can
quickly discover vulnerabilities existing in a certain software has always been the focus of …
quickly discover vulnerabilities existing in a certain software has always been the focus of …
[HTML][HTML] Systematic review of web application security vulnerabilities detection methods
S Rafique, M Humayun, Z Gul, A Abbas… - Journal of Computer and …, 2015 - scirp.org
In recent years, web security has been viewed in the context of securing the web application
layer from attacks by unauthorized users. The vulnerabilities existing in the web application …
layer from attacks by unauthorized users. The vulnerabilities existing in the web application …
Web application security vulnerabilities detection approaches: A systematic mapping study
S Rafique, M Humayun, B Hamid… - 2015 IEEE/ACIS …, 2015 - ieeexplore.ieee.org
Number of security vulnerabilities in web application has grown with the tremendous growth
of web application in last two decades. As the domain of Web Applications is maturing, large …
of web application in last two decades. As the domain of Web Applications is maturing, large …
Time series modeling of vulnerabilities
Y Roumani, JK Nwankpa, YF Roumani - Computers & Security, 2015 - Elsevier
Vulnerability prediction models forecast future vulnerabilities and can be used to assess
security risks and estimate the resources needed for handling potential security breaches …
security risks and estimate the resources needed for handling potential security breaches …
[PDF][PDF] Defining and assessing quantitative security risk measures using vulnerability lifecycle and cvss metrics
HC Joh, YK Malaiya - The 2011 international conference on security and …, 2011 - Citeseer
Known vulnerabilities which have been discovered but not patched represents a security
risk which can lead to considerable financial damage or loss of reputation. They include …
risk which can lead to considerable financial damage or loss of reputation. They include …
[PDF][PDF] Software vulnerability markets: Discoverers and buyers
AM Algarni, YK Malaiya - International Journal of Computer and …, 2014 - academia.edu
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have
received some attention recently. However, the role of interaction among the vulnerability …
received some attention recently. However, the role of interaction among the vulnerability …
An empirical methodology to evaluate vulnerability discovery models
F Massacci, VH Nguyen - IEEE Transactions on Software …, 2014 - ieeexplore.ieee.org
Vulnerability discovery models (VDMs) operate on known vulnerability data to estimate the
total number of vulnerabilities that will be reported after a software is released. VDMs have …
total number of vulnerabilities that will be reported after a software is released. VDMs have …
Time between vulnerability disclosures: A measure of software product vulnerability
Time between vulnerability disclosure (TBVD) for individual analysts is proposed as a
meaningful measure of the likelihood of finding a zero-day vulnerability within a given …
meaningful measure of the likelihood of finding a zero-day vulnerability within a given …
Characterization and classification of malicious Web traffic
K Goseva-Popstojanova, G Anastasovski… - Computers & …, 2014 - Elsevier
Web systems commonly face unique set of vulnerabilities and security threats due to their
high exposure, access by browsers, and integration with databases. This study is focused on …
high exposure, access by browsers, and integration with databases. This study is focused on …
Time series forecast modeling of vulnerabilities in the android operating system using ARIMA and deep learning methods
K Gencer, F Başçiftçi - Sustainable Computing: Informatics and Systems, 2021 - Elsevier
Security vulnerability prediction models allow estimation of the number of potential
vulnerabilities and evaluation of the risks caused by these vulnerabilities. In particular, for …
vulnerabilities and evaluation of the risks caused by these vulnerabilities. In particular, for …