Predicting the change impact of resolving defects by leveraging the topics of issue reports in open source software systems

M Assi, S Hassan, S Georgiou, Y Zou - ACM Transactions on Software …, 2023 - dl.acm.org
Upon receiving a new issue report, practitioners start by investigating the defect type, the
potential fixing effort needed to resolve the defect and the change impact. Moreover, issue …

Understanding vulnerabilities by refining taxonomy

NH Ahmad, SA Aljunid - 2011 7th International Conference …, 2011 - ieeexplore.ieee.org
Since early 90s, experts have proposed various ways to prevent exploitations and avoid
releasing software with vulnerabilities. One way is through educating developers with …

[PDF][PDF] Ontology Model for C-Overflow Vulnerabilities Attack

NH Ahmad, SA Aljunid, NK Ismail, M Annamalai… - International …, 2020 - academia.edu
The researcher propose the ontology model for C overflow vulnerabilities (COV) Ontology
which include the relationship between vulnerabilities and its properties. Many current …

[PDF][PDF] VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM–PAST, PRESENT, AND FUTURE

NH Ahmad, SA Aljunid, JL Ab Manan - 2013 - researchgate.net
Software vulnerabilities are regard as the most critical vulnerabilities due to its impact and
availability as compared to hardware and network vulnerabilities. Throughout the years from …

[引用][C] Taxonomy for Denial-of-Service Vulnerabilities in the Linux Kernel.(2014)

RS Fraga, EA Anaya, RA Bermejo - 2014