The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
The detection of software vulnerability requires critical attention during the development phase to make it secure and less vulnerable. Vulnerable software always invites hackers to perform malicious activities and disrupt the operation of the software, which leads to millions in financial losses to...
| Main Authors: | Hazim, Hanif, Mohd Hairul Nizam, Md Nasir, Mohd Faizal, Ab Razak, Ahmad, Firdaus, Nor Badrul, Anuar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2021
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/33731/ http://umpir.ump.edu.my/id/eprint/33731/1/The%20rise%20of%20software%20vulnerability%20Taxonomy%20of%20software.pdf |
Similar Items
Vulnerability Detection System (Xposed)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
by: Ranak, M. S. A. Noman, et al.
Published: (2018)
Comparative analysis of machine learning models to predict common vulnerabilities and exposure
by: Shaesta Khan, Sheh Rahman, et al.
Published: (2024)
by: Shaesta Khan, Sheh Rahman, et al.
Published: (2024)
A source code perspective C overflow vulnerabilities exploit taxonomy based on well-defined criteria / Nurul Haszeli Ahmad
by: Ahmad, Nurul Haszeli
Published: (2015)
by: Ahmad, Nurul Haszeli
Published: (2015)
The rise and evolution of agile software development
by: Hoda, Rashina, et al.
Published: (2018)
by: Hoda, Rashina, et al.
Published: (2018)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Detection on ambiguous software requirements specification written in malay using machine learning
by: Zahrin, Mohd Firdaus
Published: (2017)
by: Zahrin, Mohd Firdaus
Published: (2017)
The Rise of “malware”: Bibliometric Analysis of Malware Study
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
by: Mohd Faizal, Ab Razak, et al.
Published: (2016)
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario
by: Tahaei, Hamid, et al.
Published: (2018)
by: Tahaei, Hamid, et al.
Published: (2018)
Biologically Inspired Execution Framework for
Vulnerable Workflow Systems
by: Safdar, S., et al.
Published: (2009)
by: Safdar, S., et al.
Published: (2009)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
A Framework of universities' smart campus to detect and mitigate vulnerabilities for IoT devices
by: Mazlina, Abdul Majid, et al.
Published: (2023)
by: Mazlina, Abdul Majid, et al.
Published: (2023)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
The rise of “blockchain”: bibliometric analysis of blockchain study
by: Firdaus, Ahmad, et al.
Published: (2019)
by: Firdaus, Ahmad, et al.
Published: (2019)
Software defined internet of things in smart city: A review
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
Change vulnerability forecasting using deep learning algorithm for Southeast Asia
by: Amelia Ritahani, Ismail, et al.
Published: (2018)
by: Amelia Ritahani, Ismail, et al.
Published: (2018)
Analyzing the instructions vulnerability of dense convolutional network on GPUS
by: Khalid, Adam, et al.
Published: (2021)
by: Khalid, Adam, et al.
Published: (2021)
Software requirement analysis for point of sales tinting software
by: Manikam, Sadesh
Published: (2007)
by: Manikam, Sadesh
Published: (2007)
A tool for detecting ambiguity in software requirement specification
by: Isse, Abdirashid Ali
Published: (2019)
by: Isse, Abdirashid Ali
Published: (2019)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Software effort estimation using machine learning technique
by: Rahman, Mizanur, et al.
Published: (2023)
by: Rahman, Mizanur, et al.
Published: (2023)
Professional Employees: Are They Not Vulnerable?
by: Nazruzila Razniza, Mohd Nadzri, et al.
Published: (2019)
by: Nazruzila Razniza, Mohd Nadzri, et al.
Published: (2019)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Integrating Edge Computing and Software Defined Networking in Internet of Things: A Systematic Review
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2023)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
Evaluating software inspection cognition levels using Blooms Taxonomy
by: McMeekin, David, et al.
Published: (2009)
by: McMeekin, David, et al.
Published: (2009)
The five Ws taxonomy on customization of software as a service applications
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2018)
by: Ali, Abdulrazzaq Qasem, et al.
Published: (2018)
Review and empirical analysis of machine learning-based software effort estimation
by: Rahman, Mizanur, et al.
Published: (2024)
by: Rahman, Mizanur, et al.
Published: (2024)
Gender and vulnerable types among vulnerable member in Malaysia fisheries and aquaculture community
by: Zainalaludin, Zumilah, et al.
Published: (2017)
by: Zainalaludin, Zumilah, et al.
Published: (2017)
Machine learning technique for phishing website detection
by: Nurul Amira, Mohd Zin, et al.
by: Nurul Amira, Mohd Zin, et al.
Detecting opinion spams through supervised boosting approach
by: Mohamad, Hazim, et al.
Published: (2018)
by: Mohamad, Hazim, et al.
Published: (2018)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Similar Items
-
Vulnerability Detection System (Xposed)
by: Nurin Azyyati, Kamilizahri
Published: (2023) -
An Analysis on Vulnerabilities of Password Retrying
by: Ranak, M. S. A. Noman, et al.
Published: (2018) -
Comparative analysis of machine learning models to predict common vulnerabilities and exposure
by: Shaesta Khan, Sheh Rahman, et al.
Published: (2024) -
A source code perspective C overflow vulnerabilities exploit taxonomy based on well-defined criteria / Nurul Haszeli Ahmad
by: Ahmad, Nurul Haszeli
Published: (2015) -
The rise and evolution of agile software development
by: Hoda, Rashina, et al.
Published: (2018)