SF Wen, A Shukla, B Katt - International Journal of Information Security, 2025 - Springer
Abstract System Security Assurance (SSA) has emerged as a critical methodology for organizations to verify the trustworthiness of their systems by evaluating security measures …
H Kekül, B Ergen, H Arslan - International Journal of Information Security, 2024 - Springer
Cyber security has an increasing importance since the day when information technologies are an invariable part of modern human life. One of the fundamental areas of cyber security …
In order to protect information systems against threats and vulnerabilities, security breaches should be analyzed. In this case, analysts primarily conduct intelligence research through …
THM Le - arXiv preprint arXiv:2207.11708, 2022 - arxiv.org
The thesis advances the field of software security by providing knowledge and automation support for software vulnerability assessment using data-driven approaches. Software …
D Levshun - … Conference on Intelligent Information Technologies for …, 2023 - Springer
One of the most effective approaches to network security analysis is using attack graphs that are based on vulnerabilities from open databases. In this case, the problem may arise that …
Software security mainly studies vulnerability detection: is my code vulnerable today? This hinders risk estimation, so new approaches are emerging to forecast the occurrence of …
The analysis and grading of software vulnerabilities is an important process that is done manually by experts today. For this reason, there are time delays, human errors, and …
Bir yazılım bileşeninin güvenlik açığı eğiliminin öngörülmesi, yazılım mühendisliğinin zorlayıcı araştırma alanlarından biridir. Bir bileşenin güvenlik açığı eğilimi hakkında önceden …
M Esposito - arXiv preprint arXiv:2501.05165, 2025 - arxiv.org
Context. Developing secure and reliable software remains a key challenge in software engineering (SE). The ever-evolving technological landscape offers both opportunities and …