A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?

F Lomio, E Iannone, A De Lucia, F Palomba… - Journal of Systems and …, 2022 - Elsevier
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …

Enhancing Vulnerability prioritization: Data-driven exploit predictions with community-driven insights

J Jacobs, S Romanosky, O Suciu… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
The number of disclosed vulnerabilities has been steadily increasing over the years. At the
same time, organizations face significant challenges patching their systems, leading to a …

Machine learning techniques for software vulnerability prediction: a comparative study

G Jabeen, S Rahim, W Afzal, D Khan, AA Khan… - Applied …, 2022 - Springer
Software vulnerabilities represent a major cause of security problems. Various vulnerability
discovery models (VDMs) attempt to model the rate at which the vulnerabilities are …

Security vulnerabilities in healthcare: an analysis of medical devices and software

CM Mejía-Granda, JL Fernández-Alemán… - Medical & Biological …, 2024 - Springer
The integration of IoT in healthcare has introduced vulnerabilities in medical devices and
software, posing risks to patient safety and system integrity. This study aims to bridge the …

Trending or not? Predictive analysis for youtube videos

MS Irshad, A Anand, M Ram - International Journal of System Assurance …, 2024 - Springer
The internet has brought about significant transformations in communication and human
behaviour. It has revolutionised how people connect, express themselves, and socialise …

Risk-based reliability assessment and testing stop time based software system modeling

P Gupta, A Anand, Y Tamura, M Ram - International Journal of Quality …, 2024 - emerald.com
Purpose The ideology of this article is to study the performance concerns of SDN
Controllers, with the help of developed SRGM and thereby obtain its optimal testing …

Exploitation of vulnerabilities: a topic-based machine learning framework for explaining and predicting exploitation

K Charmanas, N Mittas, L Angelis - Information, 2023 - mdpi.com
Security vulnerabilities constitute one of the most important weaknesses of hardware and
software security that can cause severe damage to systems, applications, and users. As a …

A Systematic Literature Review on Software Vulnerability Prediction Models

D Bassi, H Singh - IEEE Access, 2023 - ieeexplore.ieee.org
The prediction of software vulnerability requires crucial awareness during the software
specification, design, development, and configuration to achieve less vulnerable and secure …

Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be?

E Iannone, G Sellitto, E Iaccarino, F Ferrucci… - ACM Transactions on …, 2024 - dl.acm.org
With the rate of discovered and disclosed vulnerabilities escalating, researchers have been
experimenting with machine learning to predict whether a vulnerability will be exploited …