2017
DOI: 10.1007/s41872-017-0003-y
|View full text |Cite
|
Sign up to set email alerts
|

User-dependent vulnerability discovery model and its interdisciplinary nature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Kansal et al developed a model that links the number of commercial software users (Kansal et al, 2018). In another study, Kansal et al investigated the relationship between the operational coverage function and the expected vulnerability count with a generalized statistical model (Kansal et al, 2017). Johnston used the Bayesian method in their Ph.D. thesis on vulnerability discovery modeling (Johnston, 2018).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Kansal et al developed a model that links the number of commercial software users (Kansal et al, 2018). In another study, Kansal et al investigated the relationship between the operational coverage function and the expected vulnerability count with a generalized statistical model (Kansal et al, 2017). Johnston used the Bayesian method in their Ph.D. thesis on vulnerability discovery modeling (Johnston, 2018).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Nevertheless, a potential limitation of AME model is that it does not fully fit several operating systems, such as Windows 95 operating system. Moreover, Li HF, Wan YX et al [22]- [26] further study effort-based models, and make good suggestions on how to better evaluate and apply effort-based models. Lately, a few authors introduce multivariate or multiattribute methods to model VDMs.…”
Section: B Effort-based Modelsmentioning
confidence: 99%
“…Huang et al (2013) evaluated software vulnerability prioritization using Fuzzy Analytical Hierarchy Process (FAHP) and fuzzy synthetic decision making approach. Kansal et al (2017) prioritized vulnerabilities using Analytic Network Process (ANP) method. Hence, no work has been done in the vulnerability prioritization using freshly developed MCDM approach called as best worst method (BWM) (Rezaei, 2016).…”
Section: Introductionmentioning
confidence: 99%