The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches

H Hanif, MHNM Nasir, MF Ab Razak, A Firdaus… - Journal of Network and …, 2021 - Elsevier
The detection of software vulnerability requires critical attention during the development
phase to make it secure and less vulnerable. Vulnerable software always invites hackers to …

A literature review of using machine learning in software development life cycle stages

S Shafiq, A Mashkoor, C Mayr-Dorn, A Egyed - IEEE Access, 2021 - ieeexplore.ieee.org
The software engineering community is rapidly adopting machine learning for transitioning
modern-day software towards highly intelligent and self-learning systems. However, the …

A survey on machine learning techniques for source code analysis

T Sharma, M Kechagia, S Georgiou, R Tiwari… - arXiv preprint arXiv …, 2021 - arxiv.org
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

A survey of exploitation and detection methods of XSS vulnerabilities

M Liu, B Zhang, W Chen, X Zhang - IEEE access, 2019 - ieeexplore.ieee.org
As web applications become more prevalent, web security becomes more and more
important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common …

[HTML][HTML] A survey on machine learning techniques applied to source code

T Sharma, M Kechagia, S Georgiou, R Tiwari… - Journal of Systems and …, 2024 - Elsevier
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …

Deep learning for vulnerability and attack detection on web applications: A systematic literature review

RL Alaoui, EH Nfaoui - Future Internet, 2022 - mdpi.com
Web applications are the best Internet-based solution to provide online web services, but
they also bring serious security challenges. Thus, enhancing web applications security …

Efficiency and effectiveness of web application vulnerability detection approaches: A review

B Zhang, J Li, J Ren, G Huang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …

Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review

M Kaur, M Raj, HN Lee - Sensors, 2022 - mdpi.com
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant
of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network …

Machine learning for software engineering: A systematic mapping

S Shafiq, A Mashkoor, C Mayr-Dorn… - arXiv preprint arXiv …, 2020 - arxiv.org
Context: The software development industry is rapidly adopting machine learning for
transitioning modern day software systems towards highly intelligent and self-learning …

Distributed web hacking by adaptive consensus-based reinforcement learning

N Ilić, D Dašić, M Vučetić, A Makarov, R Petrović - Artificial Intelligence, 2023 - Elsevier
In this paper, we propose a novel adaptive consensus-based learning algorithm for
automated and distributed web hacking. We aim to assist ethical hackers in conducting …