2018 IEEE Global Communications Conference (GLOBECOM) 2018
DOI: 10.1109/glocom.2018.8647583
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Prediction Based on Weighted Software Network for Secure Software Building

Abstract: To build a secure communications software, Vulnerability Prediction Models (VPMs) are used to predict vulnerable software modules in the software system before software security testing. At present many software security metrics have been proposed to design a VPM. In this paper, we predict vulnerable classes in a software system by establishing the system's weighted software network. The metrics are obtained from the nodes' attributes in the weighted software network. We design and implement a crawler tool to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 26 publications
(60 reference statements)
0
1
0
Order By: Relevance
“…They used these algorithms: MFSA, BN, NB, NN, SVM, RF .Accuracy is about 80-91%. [8] [9] Madae Zolanvri, includes Machine Learning to analyses the network vulnerability of IIOT (Industrial Internet Of Things) IIOT it refers to the Interconnected sensors, Instrument's and other devices networked together with computers industrial applications. Here they deploy backdoor, command injection and SQL .Main purpose of using IIOT in this paper is taking a huge advantage of IOT in the Industrial Control System's(ICs) they looking for Protocols ex: Madbus,DNP3,BACnet, and more.…”
Section: Literature Surveymentioning
confidence: 99%
“…They used these algorithms: MFSA, BN, NB, NN, SVM, RF .Accuracy is about 80-91%. [8] [9] Madae Zolanvri, includes Machine Learning to analyses the network vulnerability of IIOT (Industrial Internet Of Things) IIOT it refers to the Interconnected sensors, Instrument's and other devices networked together with computers industrial applications. Here they deploy backdoor, command injection and SQL .Main purpose of using IIOT in this paper is taking a huge advantage of IOT in the Industrial Control System's(ICs) they looking for Protocols ex: Madbus,DNP3,BACnet, and more.…”
Section: Literature Surveymentioning
confidence: 99%