ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Software Vulnerability Mining Based on the Human-Computer Coordination
Advances in Intelligent Systems and Computing - Intelligent Human Systems Integration 2020
◽
10.1007/978-3-030-39512-4_83
◽
2020
◽
pp. 532-538
Author(s):
Jie Liu
◽
Da He
◽
Yifan Wang
◽
Jianfeng Chen
◽
Zhihong Rao
Keyword(s):
Software Vulnerability
Download Full-text
Related Documents
Cited By
References
Survey of software vulnerability taxonomies
Journal of Computer Applications
◽
10.3724/sp.j.1087.2008.02244
◽
2009
◽
Vol 28
(9)
◽
pp. 2244-2248
Author(s):
Yi-sha LU
◽
Qing-kai ZENG
Keyword(s):
Software Vulnerability
Download Full-text
A RAkEL-based methodology to estimate software vulnerability characteristics & score - an application to EU project ECHO
Multimedia Tools and Applications
◽
10.1007/s11042-021-11073-x
◽
2021
◽
Author(s):
Georgios Aivatoglou
◽
Mike Anastasiadis
◽
Georgios Spanos
◽
Antonis Voulgaridis
◽
Konstantinos Votis
◽
...
Keyword(s):
Software Vulnerability
◽
Project Echo
◽
Eu Project
Download Full-text
Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study
IEEE Access
◽
10.1109/access.2021.3058067
◽
2021
◽
Vol 9
◽
pp. 28471-28495
Author(s):
Farzana Ahamed Bhuiyan
◽
Md Bulbul Sharif
◽
Akond Rahman
Keyword(s):
Systematic Mapping Study
◽
Mapping Study
◽
Software Vulnerability
◽
Systematic Mapping
◽
Bug Report
Download Full-text
The effect of Bellwether analysis on software vulnerability severity prediction models
Software Quality Journal
◽
10.1007/s11219-019-09490-1
◽
2020
◽
Vol 28
(4)
◽
pp. 1413-1446
◽
Cited By ~ 3
Author(s):
Patrick Kwaku Kudjo
◽
Jinfu Chen
◽
Solomon Mensah
◽
Richard Amankwah
◽
Christopher Kudjo
Keyword(s):
Prediction Models
◽
Software Vulnerability
◽
Severity Prediction
Download Full-text
A software vulnerability analysis environment based on virtualization technology
2010 IEEE International Conference on Wireless Communications, Networking and Information Security
◽
10.1109/wcins.2010.5541854
◽
2010
◽
Author(s):
Wang Chunlei
◽
Wen Yan
◽
Dai Yiqi
Keyword(s):
Vulnerability Analysis
◽
Software Vulnerability
◽
Virtualization Technology
◽
Analysis Environment
Download Full-text
Prioritizing software vulnerability types using multi-criteria decision-making techniques
Life Cycle Reliability and Safety Engineering
◽
10.1007/s41872-017-0006-8
◽
2017
◽
Vol 6
(1)
◽
pp. 57-67
◽
Cited By ~ 7
Author(s):
Ritu Sibal
◽
Ruchi Sharma
◽
Sangeeta Sabharwal
Keyword(s):
Decision Making
◽
Multi Criteria Decision Making
◽
Software Vulnerability
Download Full-text
Formally Analyzing Software Vulnerability Based on Model Checking
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
◽
10.1109/nswctc.2009.104
◽
2009
◽
Cited By ~ 1
Author(s):
Wang Chunlei
◽
Huang Minhuan
◽
He Ronghui
Keyword(s):
Model Checking
◽
Software Vulnerability
Download Full-text
PDVDS: A Pattern-Driven Software Vulnerability Detection System
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
◽
10.1109/euc.2010.88
◽
2010
◽
Author(s):
Shaoyin Cheng
◽
Jinding Wang
◽
Jiajie Wang
◽
Jun Yang
◽
Fan Jiang
Keyword(s):
Detection System
◽
Vulnerability Detection
◽
Software Vulnerability
Download Full-text
User Role Identification in Software Vulnerability Discussions over Social Networks
10.1109/isi53945.2021.9624857
◽
2021
◽
Author(s):
Rebecca Jones
◽
Daniel Fortin
◽
Samrat Chatterjee
◽
Dennis G. Thomas
◽
Lisa Newburn
Keyword(s):
Social Networks
◽
Software Vulnerability
◽
Role Identification
Download Full-text
Tutorial: A Lightweight Web Application for Software Vulnerability Demonstration
10.1109/secdev51306.2021.00014
◽
2021
◽
Author(s):
David Lee
◽
Brandon Steed
◽
Yi Liu
◽
Onyeka Ezenwoye
Keyword(s):
Web Application
◽
Software Vulnerability
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close