Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Awad A. Younis"'
Publikováno v:
Journal of Parallel and Distributed Computing. 158:151-163
Upon graduation, a computer science student should have a good understanding of the current technology and have the soft skills necessary to secure a position in industry. Considering that typical computers and even the common smartphone are multicor
Autor:
Carl Wilhjelm, Awad A. Younis
Publikováno v:
QRS Companion
Machine learning (ML) models are now a key component for many applications. However, machine learning based systems (MLBSs), those systems that incorporate them, have proven vulnerable to various new attacks as a result. Currently, there exists no sy
Publikováno v:
International Journal of Performability Engineering. 16:1008
Publikováno v:
Software Quality Journal. 24:159-202
Attacks on computer systems are now attracting increased attention. While the current trends in software vulnerability discovery indicate that the number of newly discovered vulnerabilities continues to be significant, the time between the public dis
Publikováno v:
CODASPY
Not all vulnerabilities are equal. Some recent studies have shown that only a small fraction of vulnerabilities that have been reported has actually been exploited. Since finding and addressing potential vulnerabilities in a program can take consider
Autor:
Yashwant K. Malaiya, Awad A. Younis
Publikováno v:
QRS
Evaluating the accuracy of vulnerability security risk metrics is important because incorrectly assessing a vulnerability to be more critical could lead to a waste of limited resources available and ignoring a vulnerability incorrectly assessed as no
Autor:
Awad A. Younis, Yashwant K. Malaiya
Publikováno v:
SERE (Companion)
Most of the attacks on computer systems are due to the presence of vulnerabilities in software. Recent trends show that number of newly discovered vulnerabilities still continue to be significant. Studies have also shown that the time gap between the
Publikováno v:
HASE
An unpatched vulnerability can lead to security breaches. When a new vulnerability is discovered, it needs to be assessed so that it can be prioritized. A major challenge in software security is the assessment of the potential risk due to vulnerabili