Quantified security is a weak hypothesis: a critical survey of results and assumptions
V Verendel - Proceedings of the 2009 workshop on New security …, 2009 - dl.acm.org
This paper critically surveys previous work on quantitative representation and analysis of
security. Such quantified security has been presented as a general approach to precisely …
security. Such quantified security has been presented as a general approach to precisely …
Quantitative vulnerability assessment of systems software
OH Alhazmi, YK Malaiya - Annual Reliability and …, 2005 - ieeexplore.ieee.org
This paper addresses feasibility of vulnerabilities present in the software. Vulnerabilities
present in such software represent significant security risks. For Windows 98 and Windows …
present in such software represent significant security risks. For Windows 98 and Windows …
Analysis of operating system diversity for intrusion tolerance
One of the key benefits of using intrusion‐tolerant systems is the possibility of ensuring
correct behavior in the presence of attacks and intrusions. These security gains are directly …
correct behavior in the presence of attacks and intrusions. These security gains are directly …
Forecasting IT security vulnerabilities–An empirical analysis
Today, organizations must deal with a plethora of IT security threats and to ensure smooth
and uninterrupted business operations, firms are challenged to predict the volume of IT …
and uninterrupted business operations, firms are challenged to predict the volume of IT …
Vulnerability scrying method for software vulnerability discovery prediction without a vulnerability database
Predicting software vulnerability discovery trends can help improve secure deployment of
software applications and facilitate backup provisioning, disaster recovery, diversity …
software applications and facilitate backup provisioning, disaster recovery, diversity …
Modelling and predicting software vulnerabilities using a sigmoid function
J Iqbal, T Firdous, AK Shrivastava, I Saraf - International Journal of …, 2022 - Springer
Presence of vulnerabilities in any software can pose serious risk to majority of users of that
software, especially in web browsers or operating systems. The assertion that a software is …
software, especially in web browsers or operating systems. The assertion that a software is …
An empirical methodology to evaluate vulnerability discovery models
F Massacci, VH Nguyen - IEEE Transactions on Software …, 2014 - ieeexplore.ieee.org
Vulnerability discovery models (VDMs) operate on known vulnerability data to estimate the
total number of vulnerabilities that will be reported after a software is released. VDMs have …
total number of vulnerabilities that will be reported after a software is released. VDMs have …
Time series forecast modeling of vulnerabilities in the android operating system using ARIMA and deep learning methods
K Gencer, F Başçiftçi - Sustainable Computing: Informatics and Systems, 2021 - Elsevier
Security vulnerability prediction models allow estimation of the number of potential
vulnerabilities and evaluation of the risks caused by these vulnerabilities. In particular, for …
vulnerabilities and evaluation of the risks caused by these vulnerabilities. In particular, for …
Modeling vulnerability discovery process in Apache and IIS HTTP servers
SW Woo, HC Joh, OH Alhazmi, YK Malaiya - Computers & Security, 2011 - Elsevier
Vulnerability discovery models allow prediction of the number of vulnerabilities that are likely
to be discovered in the future. Hence, they allow the vendors and the end users to manage …
to be discovered in the future. Hence, they allow the vendors and the end users to manage …
The tip of the iceberg: On the merits of finding security bugs
N Alexopoulos, SM Habib, S Schulz… - ACM Transactions on …, 2020 - dl.acm.org
In this article, we investigate a fundamental question regarding software security: Is the
security of SW releases increasing over time? We approach this question with a detailed …
security of SW releases increasing over time? We approach this question with a detailed …