Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Navneet Bhatt"'
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 2, Iss 4, Pp 288-299 (2017)
With the association of software security assurance in the development of code based systems; software developers are relying on the Vulnerability discovery models to mitigate the breaches by estimating the total number of vulnerabilities, before the
Externí odkaz:
https://doaj.org/article/3025c4ac6943469095a7eebb1eb8af4d
Publikováno v:
Computers, Materials & Continua. 72:3613-3629
Publikováno v:
Quality and Reliability Engineering International. 37:648-663
Publikováno v:
Information Systems Frontiers. 23:709-722
Vulnerability Discovery Models (VDMs) attempt to estimate the potential vulnerabilities present in a software that will be discovered after a software is released. A general framework is required to encompass all the attributes such as number of dete
Publikováno v:
Springer Series in Reliability Engineering ISBN: 9783030936228
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c969bb38d89ab4408f1b631fb952235d
https://doi.org/10.1007/978-3-030-93623-5_10
https://doi.org/10.1007/978-3-030-93623-5_10
Publikováno v:
Journal of Cyber Security and Mobility.
With the increase in the discovery of vulnerabilities, the expected exploits occurred in various software platform has shown an increased growth with respect to time. Only after being discovered, the potential vulnerabilities might be exploited. Ther
Publikováno v:
International Journal of Quality & Reliability Management. 37:1113-1124
PurposeThe purpose of this paper is to provide a mathematical framework to optimally allocate resources required for the discovery of vulnerabilities pertaining to different severity risk levels.Design/methodology/approachDifferent sets of optimizati
Publikováno v:
International Journal of Computing Science and Mathematics. 15:408
Of late, the attacks or breaching of software systems has increased compared with accounts in the past. Vulnerabilities present in software have become a serious threat to security, and many times, intruders exploit known (as well as unknown) vulnera
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bf400b16b879038f8763b106a68e88d7
https://doi.org/10.1016/b978-0-12-815906-4.00011-7
https://doi.org/10.1016/b978-0-12-815906-4.00011-7
Autor:
Mohini Agrawal, Adarsh Anand, Alessandro Barbiero, Navneet Bhatt, F. De Caro, Lirong Cui, Antônio Carlos Lopes da Costa, Vanderley de Vasconcelos, Chen Fang, Soufiane Gasmi, Miroslav Kvassay, Dongjin Lee, Preeti Malik, Monika Manglik, Lata Nautiyal, Rong Pan, Brian A. Polin, Ludmila Pustylnik, Jan Rabcan, Mangey Ram, Amanda Laureano Raso, Alexander Rotshtein, Patrik Rusnak, Luis Mejia Sanchez, Wellington Antonio Soares, A. Vaccaro, D. Villacci, Sylwia Werbińska-Wojciechowska, Petek Yontay
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::54516f26b5cb367eb957e7517a590762
https://doi.org/10.1016/b978-0-12-815906-4.09989-9
https://doi.org/10.1016/b978-0-12-815906-4.09989-9