2017
DOI: 10.33889/ijmems.2017.2.4-022
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Characterizing Software Vulnerabilities

Abstract: With the association of software security assurance in the development of code based systems; software developers are relying on the Vulnerability discovery models to mitigate the breaches by estimating the total number of vulnerabilities, before they’re exploited by the intruders. Vulnerability Discovery Models (VDMs) provide the quantitative classification of the flaws that exists in a software that will be discovered after a software is released. In this paper, we develop a vulnerability discovery model tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
2

Relationship

4
5

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…Luo et al (2016) have used dynamic programming approach to derive an optimal maintenance schedule in open-source software. Bhatt et al (2017) have discussed the security issue created by the bugs in the software. Anand et al (2018) have incorporated the impact that software upgrades and software updates have on the reliability of the software.…”
Section: Introductionmentioning
confidence: 99%
“…Luo et al (2016) have used dynamic programming approach to derive an optimal maintenance schedule in open-source software. Bhatt et al (2017) have discussed the security issue created by the bugs in the software. Anand et al (2018) have incorporated the impact that software upgrades and software updates have on the reliability of the software.…”
Section: Introductionmentioning
confidence: 99%
“…The AML model fitted the data sets of different types of software effectively and closely. Of late, many researchers have deduced VDMs based on different discovery patterns [6][7][8][9][10][11][12][13].…”
Section: Literaturementioning
confidence: 99%
“…Predicting cyber exploits has received an increasing attention in the domain of cybersecurity. However, there exists a little work in this line of research as related to the works proposed for predicting vulnerabilities in a software system 4–7 . Of late, this side of coin has been given importance in order to help the vendors to prioritize their vulnerability patching phenomenon based on the discovered vulnerability's likelihood of exploitation.…”
Section: Related Workmentioning
confidence: 99%