Software vulnerability prediction: A systematic mapping study
Context: Software security is considered a major aspect of software quality as the number of
discovered vulnerabilities in software products is growing. Vulnerability prediction is a …
discovered vulnerabilities in software products is growing. Vulnerability prediction is a …
Vulnerabilities mapping based on OWASP-SANS: a survey for static application security testing (SAST)
J Li - arXiv preprint arXiv:2004.03216, 2020 - arxiv.org
The delivery of a framework in place for secure application development is of real value for
application development teams to integrate security into their development life cycle …
application development teams to integrate security into their development life cycle …
Systematic literature review on security misconfigurations in web applications
SL Martins, FM Cruz, RP Araújo… - International Journal of …, 2024 - Taylor & Francis
Security misconfigurations are unintentional errors that can lead to vulnerabilities in
applications, compromising an organization's safety. This article aims to provide a …
applications, compromising an organization's safety. This article aims to provide a …
On the coordination of vulnerability fixes: An empirical study of practices from 13 CVE numbering authorities
Abstract The Common Vulnerabilities and Exposures (CVE) program is dedicated to
analyzing vulnerabilities, then to assigning a unique ID to them and disclosing the …
analyzing vulnerabilities, then to assigning a unique ID to them and disclosing the …
Shallow or deep? an empirical study on detecting vulnerabilities using deep learning
A Mazuera-Rozo, A Mojica-Hanke… - 2021 IEEE/ACM 29th …, 2021 - ieeexplore.ieee.org
Deep learning (DL) techniques are on the rise in the software engineering research
community. More and more approaches have been developed on top of DL models, also …
community. More and more approaches have been developed on top of DL models, also …
Securing Open Banking with Model‐View‐Controller Architecture and OWASP
D Kellezi, C Boegelund, W Meng - … communications and mobile …, 2021 - Wiley Online Library
In 2015, the European Union passed the PSD2 regulation, with the aim of transferring
ownership of bank accounts to the private person. As a result, Open Banking has become an …
ownership of bank accounts to the private person. As a result, Open Banking has become an …
[PDF][PDF] Web security: detection of cross site scripting in PHP web application using genetic algorithm
Cross site scripting (XSS) is one of the major threats to the web application security, where
the research is still underway for an effective and useful way to analyse the source code of …
the research is still underway for an effective and useful way to analyse the source code of …
Unmanned aerial vehicles: Vulnerability to cyber attacks
With the increase of technological capabilities of automated systems, the use of unmanned
aerial vehicles (UAVs) has also increased in many military and civilian applications. UAVs …
aerial vehicles (UAVs) has also increased in many military and civilian applications. UAVs …
Towards secure open banking architecture: an evaluation with OWASP
D Kellezi, C Boegelund, W Meng - Network and System Security: 13th …, 2019 - Springer
Abstract The European Union passed the PSD2 regulation in 2015, which gives ownership
of bank accounts to the private person owning it. As a result, the term Open Banking …
of bank accounts to the private person owning it. As a result, the term Open Banking …
Vulnerabilities of modern web applications
F Holík, S Neradova - 2017 40th International Convention on …, 2017 - ieeexplore.ieee.org
The security of modern web applications is becoming increasingly important with their
growing usage. As millions of people use these services, the availability, integrity, and …
growing usage. As millions of people use these services, the availability, integrity, and …