The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches

H Hanif, MHNM Nasir, MF Ab Razak, A Firdaus… - Journal of Network and …, 2021 - Elsevier
The detection of software vulnerability requires critical attention during the development
phase to make it secure and less vulnerable. Vulnerable software always invites hackers to …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

Identifying security issues for mobile applications based on user review summarization

C Tao, H Guo, Z Huang - Information and Software Technology, 2020 - Elsevier
Context With the development of mobile apps, public concerns about security issues are
continually rising. From the user's perspective, it is crucial to be aware of the security issues …

Accounting and billing for federated cloud infrastructures

E Elmroth, FG Marquez, D Henriksson… - … Conference on Grid …, 2009 - ieeexplore.ieee.org
Emerging Cloud computing infrastructures provide computing resources on demand based
on postpaid principles. For example, the RESERVOIR project develops an infrastructure …

[PDF][PDF] Security Aspect in Software Testing Perspective: A Systematic Literature Review.

HW Awalurahman, IH Witsqa… - Journal of …, 2023 - e-journal.unair.ac.id
Background: Software testing and software security have become one of the most important
parts of an application. Many studies have explored each of these topics but there is a gap …

Examining the relationship between firm's financial records and security vulnerabilities

Y Roumani, JK Nwankpa, YF Roumani - International Journal of Information …, 2016 - Elsevier
Security vulnerabilities and breaches remain a major concern for firms as they cost billions
of dollars in downtime, maintenance and disruptions. Although researchers in the fields of …

A tool supported methodology to passively test asynchronous systems with multiple users

MG Merayo, RM Hierons, M Núñez - Information and Software Technology, 2018 - Elsevier
Context: Testing usually involves the interaction of the tester with the system under test.
However, there are many situations in which this interaction is not feasible and so one …

A manual for attack trees

T Sonderen - 2019 - essay.utwente.nl
Nowadays attack trees are often used by large organisations to analyse security threats
against their systems. Designing such an attack tree requires detailed knowledge regarding …

Predicting software vulnerabilities using topic modeling with issues

FG Bulut, H Altunel, A Tosun - 2019 4th International …, 2019 - ieeexplore.ieee.org
The existence of software vulnerabilities is an indicator of the reliability and safety of
software products. Software vulnerabilities can be predicted using metrics derived from …

Graph models for Cybersecurity--A Survey

J Wachter - arxiv preprint arxiv:2311.10050, 2023 - arxiv.org
Graph models are helpful means of analyzing computer networks as well as complex system
architectures for security. In this paper we evaluate the current state of research for …