Predicting vulnerable software components

S Neuhaus, T Zimmermann, C Holler… - Proceedings of the 14th …, 2007 - dl.acm.org
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines
existing vulnerability databases and version archives to map past vulnerabilities to …

Measuring, analyzing and predicting security vulnerabilities in software systems

OH Alhazmi, YK Malaiya, I Ray - computers & security, 2007 - Elsevier
In this work we examine the feasibility of quantitatively characterizing some aspects of
security. In particular, we investigate if it is possible to predict the number of vulnerabilities …

Dependability analysis of safety critical systems: Issues and challenges

R kamal Kaur, B Pandey, LK Singh - Annals of nuclear energy, 2018 - Elsevier
Safety critical systems progressively used in domains such as nuclear power, transport,
medical and information systems are often concerned with a formal process of dependability …

High performance connected digit recognition using hidden Markov models

LR Rabiner, JG Wilpon… - IEEE Transactions on …, 1989 - ieeexplore.ieee.org
The authors use an enhanced analysis feature set consisting of both instantaneous and
transitional spectral information and test the hidden-Markov-model (HMM)-based connected …

Design and implementation of a secure modbus protocol

IN Fovino, A Carcano, M Masera… - … Infrastructure Protection III …, 2009 - Springer
The interconnectivity of modern and legacy supervisory control and data acquisition
(SCADA) systems with corporate networks and the Internet has significantly increased the …

Modeling the vulnerability discovery process

OH Alhazmi, YK Malaiya - 16th IEEE International Symposium …, 2005 - ieeexplore.ieee.org
Security vulnerabilities in servers and operating systems are software defects that represent
great risks. Both software developers and users are struggling to contain the risk posed by …

Improving CVSS-based vulnerability prioritization and response with context information

C Fruhwirth, T Mannisto - 2009 3rd International symposium on …, 2009 - ieeexplore.ieee.org
The growing number of software security vulnerabilities is an ever-increasing challenge for
organizations. As security managers in the industry have to operate within limited budgets …

Characterizing data sharing in civil infrastructure engineering: Current practice, future vision, barriers, and promotion strategies

Y Wang, P Tang, K Liu, J Cai, R Ren, JJ Lin… - Journal of Computing …, 2023 - ascelibrary.org
Data sharing between different organizations is critical in supporting decision making in civil
infrastructure engineering projects (eg, transportation projects). Understanding the …

Combining software metrics and text features for vulnerable file prediction

Y Zhang, D Lo, X Xia, B Xu, J Sun… - 2015 20th International …, 2015 - ieeexplore.ieee.org
In recent years, to help developers reduce time and effort required to build highly secure
software, a number of prediction models which are built on different kinds of features have …

A Bayesian network approach to assess and predict software quality using activity-based quality models

S Wagner - Proceedings of the 5th International Conference on …, 2009 - dl.acm.org
Assessing and predicting the complex concept of software quality is still challenging in
practice as well as research. Activity-based quality models break down this complex concept …