Measurements of the most significant software security weaknesses

CC Galhardo, P Mell, I Bojanova, A Gueye - Proceedings of the 36th …, 2020 - dl.acm.org
In this work, we provide a metric to calculate the most significant software security
weaknesses as defined by an aggregate metric of the frequency, exploitability, and impact of …

The need for cybersecurity data and metrics: empirically assessing cyberthreat

B Valeriano - Journal of Cyber Policy, 2022 - Taylor & Francis
Without assessment metrics and data, the cybersecurity community maintains no ability to
evaluate the success or scope of operations. Calls for the collection of cybersecurity …

A decade of reoccurring software weaknesses

A Gueye, CEC Galhardo, I Bojanova… - IEEE security & …, 2021 - ieeexplore.ieee.org
The Common Weakness Enumeration community publishes an aggregate metric to
calculate the” most dangerous software errors.” However, the equation highly biases …

Correlation Between GitHub Stars and Code Vulnerabilities

MS Naveed - Journal of Computing & Biomedical Informatics, 2022 - jcbi.org
In the software industry, open-source repositories are widely utilized to speed up software
development. GitHub is a big source of open-source repositories and offers users to star the …