Modelling and predicting software vulnerabilities using a sigmoid function

J Iqbal, T Firdous, AK Shrivastava, I Saraf - International Journal of …, 2022 - Springer
Presence of vulnerabilities in any software can pose serious risk to majority of users of that
software, especially in web browsers or operating systems. The assertion that a software is …

Software security evaluation using multilevel vulnerability discovery modeling

R Sharma, AK Shrivastava, H Pham - Quality Engineering, 2023 - Taylor & Francis
In this work, we propose a new vulnerability discovery model by predicting the number and
probability of occurrence of vulnerabilities of different severity levels in software. The severity …

A memory-related vulnerability detection approach based on vulnerability model with petri net

J Chen, C Zhang, S Cai, L Zhang, L Ma - Journal of Logical and Algebraic …, 2023 - Elsevier
With the continuous development of information technology, software vulnerabilities have
become a critical threat to information security. Post-release detection of memory leaks …

AHP based determination of critical testing coverage measures for reliable & complex software systems

A Anand, P Johri, L Papic - Reliability Assessment and Optimization of …, 2025 - Elsevier
Reliability evaluation and optimization are crucial for ensuring the functionality and safety of
complex systems, especially in industries such as aerospace, automotive, and healthcare …

Processing Method of Computer Data

X Jiang - International Conference on Innovative Computing, 2023 - Springer
This paper studies a data processing method, which is applied to the client. The method
includes: determining the first privacy node set and the second privacy node set. The first …

Storage System of Computer Data

P Wang - International Conference on Innovative Computing, 2023 - Springer
This paper studies a data storage method, device and computer storage medium, including:
obtaining the current operation of the back-end storage engine Objectstore, and determining …