[HTML][HTML] The anatomy of a vulnerability database: A systematic mapping study

X Li, S Moreschini, Z Zhang, F Palomba… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities play a major role, as there are multiple risks associated, including
loss and manipulation of private data. The software engineering research community has …

[HTML][HTML] A hierarchical blockchain-enabled security-threat assessment architecture for IoV

Y Liu, L Pan, S Chen - Digital Communications and Networks, 2023 - Elsevier
Abstract In Internet of Vehicles (IoV), the security-threat information of various traffic
elements can be exploited by hackers to attack vehicles, resulting in accidents, privacy …

Tecnologías de Seguridad en Bases de Datos: Revisión Sistemática

MJ Aguirre Sánchez - 2021 - dspace.ups.edu.ec
El permanente crecimiento y el auge en las redes de internet y tecnologías permiten la
obtención de miles de datos día con día, los cuales se almacenan en bases de datos con …

Identifying characteristics of software vulnerabilities by their textual description using machine learning

K Izrailov, M Buinevich, I Kotenko… - 2021 World …, 2021 - ieeexplore.ieee.org
Significant problems in the development of secure software are the complexity of formalizing
software vulnerabilities and the lack of information security experts. The paper tests the …

Analysis of the Most Common Software and Hardware Vulnerabilities in Microprocessor Systems

KI Kostromitin, BN Dokuchaev… - 2020 International …, 2020 - ieeexplore.ieee.org
The relevance of data protection is related to the intensive informatization of various aspects
of society and the need to prevent unauthorized access to them. World spending on …

Docker Container Security Orchestration and Posture Management Tool

H Perera, B Reza, HST De Silva… - 2022 13th …, 2022 - ieeexplore.ieee.org
Docker is one of the most commonly used and popular container technologies in the modern
world. And attackers are also attempting to use Docker container security issues to gain a …

Model-based evaluation of vulnerabilities in software systems

A Kenner - Proceedings of the 24th ACM International Systems …, 2020 - dl.acm.org
Vulnerabilities in software systems result from faults, which occur at different stages in a
software's life cycle, for example, in the design (ie, undesired feature-interactions), the …