System for estimation CVSS severity metrics of vulnerability based on text mining technology

A Nikonov, A Vulfin, V Vasilyev… - 2021 International …, 2021 - ieeexplore.ieee.org
A system for the automated construction of the components of the vulnerability metrics and a
quantitative assessment of the severity of a vulnerability based on the analysis of its textual …

Identifying characteristics of software vulnerabilities by their textual description using machine learning

K Izrailov, M Buinevich, I Kotenko… - 2021 World …, 2021 - ieeexplore.ieee.org
Significant problems in the development of secure software are the complexity of formalizing
software vulnerabilities and the lack of information security experts. The paper tests the …

Experimental Investigation of Web Application Security

V Strukov, V Gudilin - 2021 IEEE 4th International Conference …, 2021 - ieeexplore.ieee.org
The purpose of the research work is to prove the effectiveness of the method of experimental
investigation of web application security, which allows for a limited time to detect the …

Evaluation of Information Security Software Using Quality and Reliability Criteria

M Karpinski, R Ziubina, A Azatov… - 2020 IEEE 5th …, 2020 - ieeexplore.ieee.org
It is determined that the stable operation of critical infrastructure depends on the reliability
and continuity of software for the protection of information resources. Failure to operate a …

Development of a tool for modeling security threats of an enterprise information system

O Kalugina, I Barankova… - … Conference on Electrical …, 2020 - ieeexplore.ieee.org
A qualitative risk assessment of information security threats make it possible to solve the
problem of information security most effectively. The paper analyzes existing approaches to …

Model for describing processes of AI systems vulnerabilities collection and analysis using big data tools

O Neretin, V Kharchenko - 2022 12th International Conference …, 2022 - ieeexplore.ieee.org
To assess the cybersecurity of attacked Artificial Intelligence (AI) systems, it is very important
to have trustworthy, up-to-date and systematic information about vulnerabilities. The paper …

Secure software developing recommendations

V Grechko, T Babenko… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Adverse effects on information in the functioning computer systems of various purpose is
carried out in order to violate their confidentiality, integrity and accessibility. These threats …

[PDF][PDF] OSINT investigation to detect and prevent cyber attacks and cyber security incidents

O Puchkov, D Lande, I Subach, M Boliukh, D Nahornyi - 2021 - dwl.kiev.ua
A methodology for investigating and predicting cyber incidents based on the use of open
sources of information and freely available open source software is offered and …

Approaches to information security threats assessment for the official website of the organization

S Alena, L Olga, P Olga, C Olga - 2022 Ural-Siberian …, 2022 - ieeexplore.ieee.org
The article provides approaches to the information security threats assessment in the case
when the owner of an information resource has the right to choose an approach to the …

Statistics of software vulnerability detection in certification testing

AV Barabanov, AS Markov… - Journal of Physics …, 2018 - iopscience.iop.org
The paper discusses practical aspects of introduction of the methods to detect software
vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the …