Classification of Microsoft office vulnerabilities: a step ahead for secure software development

S Raheja, G Munjal - Bio-inspired Neurocomputing, 2021 - Springer
Classification of software vulnerability no doubt facilitates the understanding of security-
related information and accelerates vulnerability analysis. In the absence of proper …

Toward Linux kernel memory safety

E Reshetova, H Liljestrand, A Paverd… - Software: Practice and …, 2018 - Wiley Online Library
The security of billions of devices worldwide depends on the security and robustness of the
mainline Linux kernel. However, the increasing number of kernel‐specific vulnerabilities …

Prediction of Software Vulnerabilities Using Random Forest Regressor

N Kamal, S Raheja - … Intelligence: Select Proceedings of InCITe 2022, 2023 - Springer
The launch of new software technologies with new features helps the developer in software
development but it can be prone to vulnerabilities. Software vulnerabilities are still a critical …

Malware Analysis Techniques in Android‐Based Smartphone Applications

G Munjal, A Chakravarti… - … Artificial Intelligence in …, 2024 - Wiley Online Library
Android has conquered the smartphone industry and is now the most widely used mobile
operating system. The success of Android has, however, coincided with an increase in …

[PDF][PDF] Attack surface analysis of the Linux kernel based on complexity metric

S Bavendiek - 2021 - researchgate.net
The Linux kernel is one of the dominating operating systems used today. Like any complex
system, the Linux kernel has a large attack surface that can include vulnerabilities. When …

Text mining for secure cyber space

S Raheja, G Munjal - Intelligent Data Analytics for Terror Threat …, 2021 - Wiley Online Library
Natural language processing techniques can be used to automatically classify sentences
from input texts to the potential cyber‐attack events. This work presents an expert system for …

[PDF][PDF] Linux Kernel Memory Safety

H Liljestrand - Winner, Best information security thesis in Finland …, 2017 - helda.helsinki.fi
The application space is increasingly well protected, with various new development, testing,
and runtime security mechanisms being able to detect and prevent several security-critical …