A holistic review of cybersecurity and reliability perspectives in smart airports

N Koroniotis, N Moustafa, F Schiliro… - IEEE …, 2020 - ieeexplore.ieee.org
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence
of smart airports. Services and systems powered by the IoT enable smart airports to have …

Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

A systematic literature review on automated software vulnerability detection using machine learning

N Shiri Harzevili, A Boaye Belle, J Wang… - ACM Computing …, 2024 - dl.acm.org
In recent years, numerous Machine Learning (ML) models, including Deep Learning (DL)
and classic ML models, have been developed to detect software vulnerabilities. However …

Multitask-based evaluation of open-source llm on software vulnerability

X Yin, C Ni, S Wang - IEEE Transactions on Software …, 2024 - ieeexplore.ieee.org
This paper proposes a pipeline for quantitatively evaluating interactive Large Language
Models (LLMs) using publicly available datasets. We carry out an extensive technical …

Deepcva: Automated commit-level vulnerability assessment with deep multi-task learning

THM Le, D Hin, R Croft… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give
early warnings about potential security risks. However, there is a lack of effort to assess …

An overview of trends in information systems: Emerging technologies that transform the information technology industry

H Taherdoost - Taherdoost, H.(2023). An overview of trends in …, 2023 - papers.ssrn.com
Technology is mainly characterized by being changed rapidly. In other words, it is
recognized as the ever-changing playing field. Those who aim to stay in the technology field …

An empirical study of rule-based and learning-based approaches for static application security testing

R Croft, D Newlands, Z Chen, MA Babar - Proceedings of the 15th ACM …, 2021 - dl.acm.org
Background: Static Application Security Testing (SAST) tools purport to assist developers in
detecting security issues in source code. These tools typically use rule-based approaches to …

[HTML][HTML] The whole of cyber defense: Syncing practice and theory

KM de Nobrega, AF Rutkowski, C Saunders - The Journal of Strategic …, 2024 - Elsevier
This review explores the problems Chief Information Security Officers (CISOs) and other
cyber professionals face when defending their organization against cyberattacks. Using a …

[HTML][HTML] Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach

O Alshaikh, S Parkinson, S Khan - Computers & Security, 2024 - Elsevier
Abstract Machine learning (ML) utilisation has achieved a vast global impact. This is evident
in the cybersecurity sector, where ML has wide-ranging applications, such as identifying and …