[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?

F Lomio, E Iannone, A De Lucia, F Palomba… - Journal of Systems and …, 2022 - Elsevier
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …

Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities

Y Shin, A Meneely, L Williams… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Security inspection and testing require experts in security who think like an attacker. Security
experts need to know code locations on which to focus their testing and inspection efforts …

Learning to predict severity of software vulnerability using only vulnerability description

Z Han, X Li, Z Xing, H Liu, Z Feng - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Software vulnerabilities pose significant security risks to the host computing system. Faced
with continuous disclosure of software vulnerabilities, system administrators must prioritize …

Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities

I Chowdhury, M Zulkernine - Journal of Systems Architecture, 2011 - Elsevier
Software security failures are common and the problem is growing. A vulnerability is a
weakness in the software that, when exploited, causes a security failure. It is difficult to detect …

Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey

V Sharma, I You, K Andersson, F Palmieri… - IEEE …, 2020 - ieeexplore.ieee.org
With an enormous range of applications, the Internet of Things (IoT) has magnetized
industries and academicians from everywhere. IoT facilitates operations through ubiquitous …

Defending connected vehicles against malware: Challenges and a solution framework

T Zhang, H Antunes, S Aggarwal - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
Vehicles face growing security threats as they become increasingly connected with the
external world. Hackers, researchers, and car hobbyists have compromised security keys …

Robot cybersecurity, a review

V Mayoral-Vilches - International Journal of Cyber Forensics and …, 2022 - conceptechint.net
Robots are often shipped insecure and in some cases fully unprotected. The rationale
behind is threefold: first, defensive security mechanisms for robots are still in their early …

The secret life of software vulnerabilities: A large-scale empirical study

E Iannone, R Guadagni, F Ferrucci… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Software vulnerabilities are weaknesses in source code that can be potentially exploited to
cause loss or harm. While researchers have been devising a number of methods to deal …

Can traditional fault prediction models be used for vulnerability prediction?

Y Shin, L Williams - Empirical Software Engineering, 2013 - Springer
Finding security vulnerabilities requires a different mindset than finding general faults in
software—thinking like an attacker. Therefore, security engineers looking to prioritize …

Security of cryptocurrency using hardware wallet and qr code

AG Khan, AH Zahid, M Hussain… - … Conference on Innovative …, 2019 - ieeexplore.ieee.org
Today, the privacy and the security of any organization are the key requirement, the digital
online transaction of money or coins also needed a certain level of security not only during …