A software security assessment system based on analysis of vulnerabilities

被引:0
|
作者
Sui, Chenmeng [1 ,2 ]
Liu, Yanzhao [1 ]
Liu, Yun [2 ]
机构
[1] China Information Technology Security Evaluation Center, Beijing, China
[2] Key Laboratory of Communication and Information Systems, Beijing Jiaotong University, Beijing, China
关键词
D O I
10.4156/jcit.vol7.issue6.26
中图分类号
学科分类号
摘要
引用
收藏
页码:211 / 219
相关论文
共 50 条
  • [1] On the Detection and Analysis of Software Security Vulnerabilities
    Wijesiriwardana, Chaman
    Wimalaratne, Prasad
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [2] Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics
    Ghani, Hamza
    Luna, Jesus
    Suri, Neeraj
    [J]. 2013 INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS), 2013,
  • [3] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Carlos M. Mejía-Granda
    José L. Fernández-Alemán
    Juan M. Carrillo-de-Gea
    José A. García-Berná
    [J]. Medical & Biological Engineering & Computing, 2024, 62 : 257 - 273
  • [4] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Mejia-Granda, Carlos M.
    Fernandez-Aleman, Jose L.
    Carrillo-de-Gea, Juan M.
    Garcia-Berna, Jose A.
    [J]. MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2024, 62 (01) : 257 - 273
  • [5] Labeling Software Security Vulnerabilities
    Bojanova, Irena
    Guerrerio, John J.
    [J]. IT PROFESSIONAL, 2023, 25 (05) : 64 - 70
  • [6] Analysis of Software Vulnerabilities, Measures for Prevention and Protection and Security Testing
    Nakov, Ognian
    Trifonov, Roumen
    Pavlova, Galya
    Nakov, Plamen
    [J]. 2021 29TH NATIONAL CONFERENCE WITH INTERNATIONAL PARTICIPATION (TELECOM), 2021, : 73 - 76
  • [7] Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis
    Wang, Wentao
    Dumont, Faryn
    Niu, Nan
    Horton, Glen
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (05) : 1665 - 1675
  • [8] On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids
    Mathas, Christos-Minas
    Vassilakis, Costas
    Kolokotronis, Nicholas
    Zarakovitis, Charilaos C.
    Kourtis, Michail-Alexandros
    [J]. ENERGIES, 2021, 14 (10)
  • [9] Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities
    Sadeghi, Alireza
    Esfahani, Naeem
    Malek, Sam
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2014, 2014, 8411 : 155 - 169
  • [10] Security Risk Analysis based on probability of system failure, attacks and Vulnerabilities
    Kbar, Ghassan
    [J]. 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 874 - 879