[PDF][PDF] Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery

IA Shah, S Rajper, N ZamanJhanjhi - International Journal of …, 2021 - academia.edu
Today's age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both
techniques play a significant role in measuring vulnerability prediction accuracy. In the field …

Machine learning techniques for software vulnerability prediction: a comparative study

G Jabeen, S Rahim, W Afzal, D Khan, AA Khan… - Applied …, 2022 - Springer
Software vulnerabilities represent a major cause of security problems. Various vulnerability
discovery models (VDMs) attempt to model the rate at which the vulnerabilities are …

Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey

SM Ghaffarian, HR Shahriari - ACM computing surveys (CSUR), 2017 - dl.acm.org
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …

Extracting rules for vulnerabilities detection with static metrics using machine learning

A Gupta, B Suri, V Kumar, P Jain - International Journal of System …, 2021 - Springer
Software quality is the prime solicitude in software engineering and vulnerability is one of
the major threat in this respect. Vulnerability hampers the security of the software and also …

The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches

H Hanif, MHNM Nasir, MF Ab Razak, A Firdaus… - Journal of Network and …, 2021 - Elsevier
The detection of software vulnerability requires critical attention during the development
phase to make it secure and less vulnerable. Vulnerable software always invites hackers to …

A systematic literature review of software vulnerability detection

AC Eberendu, VI Udegbe, EO Ezennorom… - European Journal of …, 2022 - tudr.org
This study provided a systematic literature review of software vulnerability detection (SVD)
by searching ACM and IEEE databases for related literatures. Using the Preferred Reporting …

[PDF][PDF] Different machine learning algorithms used for secure software advance using software repositories

K Chaudhary, DS Singh - … Journal of Scientific Research in Computer …, 2023 - academia.edu
In the present phase of the Fourth Industrial Revolution (4IR or Industry 4.0), the digital world
has a wealth of data, such as Internet of Things (IoT) data, cybersecurity data, mobile data …

An empirical study on using the national vulnerability database to predict software vulnerabilities

S Zhang, D Caragea, X Ou - … , DEXA 2011, Toulouse, France, August 29 …, 2011 - Springer
Software vulnerabilities represent a major cause of cyber-security problems. The National
Vulnerability Database (NVD) is a public data source that maintains standardized …

A survey of feature selection for vulnerability prediction using feature-based machine learning

ZJ Li, Y Shao - Proceedings of the 2019 11th International Conference …, 2019 - dl.acm.org
This paper summarized the basic process of software vulnerability prediction using feature-
based machine learning for the first time. In addition to sorting out the related types and …

Predicting cyber risks through national vulnerability database

S Zhang, X Ou, D Caragea - Information Security Journal: A Global …, 2015 - Taylor & Francis
Software vulnerabilities are the major cause of cyber security problems. The National
Vulnerability Database (NVD) is a public data source that maintains standardized …