ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Reproducible Software Vulnerability Testing with IaC
2020 International Conference on Computational Science and Computational Intelligence (CSCI)
◽
10.1109/csci51800.2020.00013
◽
2020
◽
Author(s):
Kohei Akasaka
◽
Akihito Nakamura
Keyword(s):
Software Vulnerability
◽
Vulnerability Testing
Download Full-text
Related Documents
Cited By
References
Research on Software Vulnerability Testing Based on Function-Call
2009 WRI International Conference on Communications and Mobile Computing
◽
10.1109/cmc.2009.141
◽
2009
◽
Author(s):
Fanping Zeng
◽
Minghui Chen
◽
Kaitao Yin
◽
Xufa Wang
Keyword(s):
Software Vulnerability
◽
Function Call
◽
Vulnerability Testing
Download Full-text
Fault Injection Technology for Software Vulnerability Testing Based on Xen
2009 WRI World Congress on Software Engineering
◽
10.1109/wcse.2009.172
◽
2009
◽
Cited By ~ 2
Author(s):
Fanping Zeng
◽
Juan Li
◽
Ling Li
◽
Xufa Wang
Keyword(s):
Fault Injection
◽
Software Vulnerability
◽
Vulnerability Testing
◽
Injection Technology
Download Full-text
Automated Software Vulnerability Testing Using Deep Learning Methods
2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON)
◽
10.1109/ukrcon.2019.8879997
◽
2019
◽
Cited By ~ 3
Author(s):
Alexandr Kuznetsov
◽
Yehor Yeromin
◽
Oleksiy Shapoval
◽
Kyrylo Chernov
◽
Mariia Popova
◽
...
Keyword(s):
Deep Learning
◽
Software Vulnerability
◽
Learning Methods
◽
Vulnerability Testing
◽
Automated Software
Download Full-text
Survey of software vulnerability taxonomies
Journal of Computer Applications
◽
10.3724/sp.j.1087.2008.02244
◽
2009
◽
Vol 28
(9)
◽
pp. 2244-2248
Author(s):
Yi-sha LU
◽
Qing-kai ZENG
Keyword(s):
Software Vulnerability
Download Full-text
A RAkEL-based methodology to estimate software vulnerability characteristics & score - an application to EU project ECHO
Multimedia Tools and Applications
◽
10.1007/s11042-021-11073-x
◽
2021
◽
Author(s):
Georgios Aivatoglou
◽
Mike Anastasiadis
◽
Georgios Spanos
◽
Antonis Voulgaridis
◽
Konstantinos Votis
◽
...
Keyword(s):
Software Vulnerability
◽
Project Echo
◽
Eu Project
Download Full-text
Security Bug Report Usage for Software Vulnerability Research: A Systematic Mapping Study
IEEE Access
◽
10.1109/access.2021.3058067
◽
2021
◽
Vol 9
◽
pp. 28471-28495
Author(s):
Farzana Ahamed Bhuiyan
◽
Md Bulbul Sharif
◽
Akond Rahman
Keyword(s):
Systematic Mapping Study
◽
Mapping Study
◽
Software Vulnerability
◽
Systematic Mapping
◽
Bug Report
Download Full-text
The effect of Bellwether analysis on software vulnerability severity prediction models
Software Quality Journal
◽
10.1007/s11219-019-09490-1
◽
2020
◽
Vol 28
(4)
◽
pp. 1413-1446
◽
Cited By ~ 3
Author(s):
Patrick Kwaku Kudjo
◽
Jinfu Chen
◽
Solomon Mensah
◽
Richard Amankwah
◽
Christopher Kudjo
Keyword(s):
Prediction Models
◽
Software Vulnerability
◽
Severity Prediction
Download Full-text
A software vulnerability analysis environment based on virtualization technology
2010 IEEE International Conference on Wireless Communications, Networking and Information Security
◽
10.1109/wcins.2010.5541854
◽
2010
◽
Author(s):
Wang Chunlei
◽
Wen Yan
◽
Dai Yiqi
Keyword(s):
Vulnerability Analysis
◽
Software Vulnerability
◽
Virtualization Technology
◽
Analysis Environment
Download Full-text
Prioritizing software vulnerability types using multi-criteria decision-making techniques
Life Cycle Reliability and Safety Engineering
◽
10.1007/s41872-017-0006-8
◽
2017
◽
Vol 6
(1)
◽
pp. 57-67
◽
Cited By ~ 7
Author(s):
Ritu Sibal
◽
Ruchi Sharma
◽
Sangeeta Sabharwal
Keyword(s):
Decision Making
◽
Multi Criteria Decision Making
◽
Software Vulnerability
Download Full-text
Formally Analyzing Software Vulnerability Based on Model Checking
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
◽
10.1109/nswctc.2009.104
◽
2009
◽
Cited By ~ 1
Author(s):
Wang Chunlei
◽
Huang Minhuan
◽
He Ronghui
Keyword(s):
Model Checking
◽
Software Vulnerability
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close