4.6 Article

Automated Risk Management Based Software Security Vulnerabilities Management

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Mechanical

Modelling and analysis of static and modal responses of leaf spring used in automobiles

A. Balakrishna et al.

Summary: The finite element-based static and modal analysis of automobile leaf spring using ANSYS Workbench showed that the combination of boron/Al-graphite/epoxy with an aspect ratio of 6.36 is the most effective in reducing weight, deflection, and improving modal response.

INTERNATIONAL JOURNAL OF HYDROMECHATRONICS (2021)

Article Computer Science, Software Engineering

The realist approach for evaluation of computational intelligence in software engineering

Raghavendra Rao Althar et al.

Summary: Secured software development requires a security mindset throughout software engineering practices, with an emphasis on considering software security during the requirements phase. Utilizing concepts like machine learning to understand data sources can help improve objectivity in conversations between requirements gathering teams and customer business teams. Strengthening traditional methods like threat modeling and exploring feature engineering in software development can also enhance security focus in requirements gathering practices.

INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING (2021)

Review Computer Science, Information Systems

Machine Learning Models for Secure Data Analytics: A taxonomy and threat model

Rajesh Gupta et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Software Engineering

Measuring the accuracy of software vulnerability assessments: experiments with students and professionals

Luca Allodi et al.

EMPIRICAL SOFTWARE ENGINEERING (2020)

Article Computer Science, Information Systems

Automating threat modeling using an ontology framework: Validated with data from critical infrastructures

Margus Valja et al.

CYBERSECURITY (2020)

Proceedings Paper Automation & Control Systems

The Effect of Weighted Moving Windows on Security Vulnerability Prediction

Patrick Kwaku Kudjo et al.

2019 34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2019) (2019)

Proceedings Paper Computer Science, Information Systems

A Unified Measurable Software Trustworthy Model based on Vulnerability Loss Speed Index

Gul Jabeen et al.

2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)

Article Computer Science, Information Systems

Toward Empirically Investigating Non-Functional Requirements of iOS Developers on Stack Overflow

Arshad Ahmad et al.

IEEE ACCESS (2019)

Editorial Material Computer Science, Software Engineering

Engineering Security Vulnerability Prevention, Detection, and Response

Laurie Williams et al.

IEEE SOFTWARE (2018)

Proceedings Paper Computer Science, Software Engineering

Challenges and Experiences with Applying Microsoft Threat Modeling in Agile Development Projects

Daniela S. Cruzes et al.

2018 25TH AUSTRALASIAN SOFTWARE ENGINEERING CONFERENCE (ASWEC) (2018)

Proceedings Paper Computer Science, Software Engineering

Detecting User Story Information in Developer-Client Conversations to Generate Extractive Summaries

Paige Rodeghero et al.

2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Experience Report: Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports

Katerina Goseva-Popstojanova et al.

2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE) (2017)

Article Computer Science, Information Systems

Time for Addressing Software Security Issues: Prediction Models and Impacting Factors

Lotfi Ben Othmane et al.

DATA SCIENCE AND ENGINEERING (2017)

Proceedings Paper Computer Science, Information Systems

Cybersecurity Through Secure Software Development

Audun Josang et al.

INFORMATION SECURITY EDUCATION ACROSS THE CURRICULUM, WISE 9 (2015)

Proceedings Paper Computer Science, Software Engineering

Requirement Acquisition from Social Q&A Sites

Ming Xiao et al.

REQUIREMENTS ENGINEERING IN THE BIG DATA ERA (2015)

Proceedings Paper Computer Science, Information Systems

The Appilication of Fuzzing in Web software security vulnerabilities Test

Li Li et al.

2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA) (2013)