Classification of Microsoft office vulnerabilities: a step ahead for secure software development
Classification of software vulnerability no doubt facilitates the understanding of security-
related information and accelerates vulnerability analysis. In the absence of proper …
related information and accelerates vulnerability analysis. In the absence of proper …
Toward Linux kernel memory safety
The security of billions of devices worldwide depends on the security and robustness of the
mainline Linux kernel. However, the increasing number of kernel‐specific vulnerabilities …
mainline Linux kernel. However, the increasing number of kernel‐specific vulnerabilities …
Prediction of Software Vulnerabilities Using Random Forest Regressor
N Kamal, S Raheja - … Intelligence: Select Proceedings of InCITe 2022, 2023 - Springer
The launch of new software technologies with new features helps the developer in software
development but it can be prone to vulnerabilities. Software vulnerabilities are still a critical …
development but it can be prone to vulnerabilities. Software vulnerabilities are still a critical …
Malware Analysis Techniques in Android‐Based Smartphone Applications
G Munjal, A Chakravarti… - … Artificial Intelligence in …, 2024 - Wiley Online Library
Android has conquered the smartphone industry and is now the most widely used mobile
operating system. The success of Android has, however, coincided with an increase in …
operating system. The success of Android has, however, coincided with an increase in …
[PDF][PDF] Attack surface analysis of the Linux kernel based on complexity metric
S Bavendiek - 2021 - researchgate.net
The Linux kernel is one of the dominating operating systems used today. Like any complex
system, the Linux kernel has a large attack surface that can include vulnerabilities. When …
system, the Linux kernel has a large attack surface that can include vulnerabilities. When …
Text mining for secure cyber space
Natural language processing techniques can be used to automatically classify sentences
from input texts to the potential cyber‐attack events. This work presents an expert system for …
from input texts to the potential cyber‐attack events. This work presents an expert system for …
[PDF][PDF] Linux Kernel Memory Safety
H Liljestrand - Winner, Best information security thesis in Finland …, 2017 - helda.helsinki.fi
The application space is increasingly well protected, with various new development, testing,
and runtime security mechanisms being able to detect and prevent several security-critical …
and runtime security mechanisms being able to detect and prevent several security-critical …