[HTML][HTML] VALIDATE: A deep dive into vulnerability prediction datasets

M Esposito, D Falessi - Information and Software Technology, 2024 - Elsevier
Context: Vulnerabilities are an essential issue today, as they cause economic damage to the
industry and endanger our daily life by threatening critical national security infrastructures …

Artificial intelligence for system security assurance: A systematic literature review

SF Wen, A Shukla, B Katt - International Journal of Information Security, 2025 - Springer
Abstract System Security Assurance (SSA) has emerged as a critical methodology for
organizations to verify the trustworthiness of their systems by evaluating security measures …

Estimating vulnerability metrics with word embedding and multiclass classification methods

H Kekül, B Ergen, H Arslan - International Journal of Information Security, 2024 - Springer
Cyber security has an increasing importance since the day when information technologies
are an invariable part of modern human life. One of the fundamental areas of cyber security …

[PDF][PDF] Comparison and analysis of software vulnerability databases

H KEKÜL, B ERGEN, H ARSLAN - International Journal of …, 2022 - academia.edu
In order to protect information systems against threats and vulnerabilities, security breaches
should be analyzed. In this case, analysts primarily conduct intelligence research through …

Towards an improved understanding of software vulnerability assessment using data-driven approaches

THM Le - arXiv preprint arXiv:2207.11708, 2022 - arxiv.org
The thesis advances the field of software security by providing knowledge and automation
support for software vulnerability assessment using data-driven approaches. Software …

Comparative analysis of machine learning methods in vulnerability metrics transformation

D Levshun - … Conference on Intelligent Information Technologies for …, 2023 - Springer
One of the most effective approaches to network security analysis is using attack graphs that
are based on vulnerabilities from open databases. In this case, the problem may arise that …

Forecasting the risk of software choices: A model to foretell security vulnerabilities from library dependencies and source code evolution

CE Budde, R Paramitha, F Massacci - arXiv preprint arXiv:2411.11202, 2024 - arxiv.org
Software security mainly studies vulnerability detection: is my code vulnerable today? This
hinders risk estimation, so new approaches are emerging to forecast the occurrence of …

[PDF][PDF] A multiclass approach to estimating software vulnerability severity rating with statistical and word embedding methods

H Kekül, B ERGEN, H ARSLAN - Int J Comput Netw Inf Secur, 2022 - mecs-press.org
The analysis and grading of software vulnerabilities is an important process that is done
manually by experts today. For this reason, there are time delays, human errors, and …

Yazılım güvenlik açığı veri tabanları

H Kekül, B Ergen, H Arslan - Avrupa Bilim ve Teknoloji Dergisi, 2021 - dergipark.org.tr
Bir yazılım bileşeninin güvenlik açığı eğiliminin öngörülmesi, yazılım mühendisliğinin
zorlayıcı araştırma alanlarından biridir. Bir bileşenin güvenlik açığı eğilimi hakkında önceden …

Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering

M Esposito - arXiv preprint arXiv:2501.05165, 2025 - arxiv.org
Context. Developing secure and reliable software remains a key challenge in software
engineering (SE). The ever-evolving technological landscape offers both opportunities and …