2021
DOI: 10.15587/1729-4061.2021.233417
|View full text |Cite
|
Sign up to set email alerts
|

Development a mathematical model for the software security testing first stage

Abstract: This paper reports an analysis of the software (SW) safety testing techniques, as well as the models and methods for identifying vulnerabilities. An issue has been revealed related to the reasoned selection of modeling approaches at different stages of the software safety testing process and the identification of its vulnerabilities, which reduces the accuracy of the modeling results obtained. Two steps in the process of identifying software vulnerabilities have been identified. A mathematical model has been b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…5). In addition, the results of a comparative analysis of the developed model with known models [10,29] show an improvement of this accuracy indicator to 5 %.…”
Section: Comparative Studies Of the Gert-model Of A Recommender Syste...mentioning
confidence: 84%
See 1 more Smart Citation
“…5). In addition, the results of a comparative analysis of the developed model with known models [10,29] show an improvement of this accuracy indicator to 5 %.…”
Section: Comparative Studies Of the Gert-model Of A Recommender Syste...mentioning
confidence: 84%
“…The W-function [28,29] of the time of identification of the state of the nodes of the recommender system in the process of forming and changing recommendations is equal to:…”
Section: Formalization and Evaluation Of Probabilistic-temporal Chara...mentioning
confidence: 99%
“…Studies of the scheme for software vulnerability research and evaluation of the results of mathematical modeling allow to conclude that the data analyzed in the system for confirming potential vulnerabilities is complex [1,2]. In this case, the summary security indicator of the software the object under study Fsec, can be represented as a sequence of the following data:…”
Section: Problem Statement and Literature Analysismentioning
confidence: 99%
“…Paper [2] reports a mathematical model of the first stage of identifying software vulnerabilities, the results of which can be used in the second, main, stageinvestigating software vulnerabilities. At the same time, taking into consideration the uncertainties of input data and intermediate results is one of the innovative components of modeling.…”
Section: The Aim and Objectives Of The Studymentioning
confidence: 99%
“…Transitions (1-3) and (2-3) correspond to the procedures for static analysis of software vulnerabilities. Transitions (1-4), (2)(3)(4), (3)(4) formalize algorithms and procedures for dynamic analysis and evaluation of the test object. It should be noted that these procedures should take into consideration the fuzziness of the input and output data.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%