2023
DOI: 10.3390/electronics12102278
|View full text |Cite
|
Sign up to set email alerts
|

A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk

Abstract: Current Internet of Things (IoT) systems comprise multiple software systems that are deployed to provide users with the required functionalities. System architects create system blueprints and draw specifications for the software artefacts that are needed; subsequently, either custom-made software is developed according to these specifications and/or ready-made COTS/open source software may be identified and customized to realize the overall system goals. All deployed software however may entail vulnerabilitie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 41 publications
0
1
0
Order By: Relevance
“…Prior research on the C4.5 technique covered attention-based lane shifts and a highway collision risk prediction model [9]. There has also been prior research on software risk, specifically a software vulnerability management methodology to reduce system risk and attack surface [10]. The approach and process of software engineering in blockchain-oriented software development are also covered in later studies [11].…”
Section: Introductionmentioning
confidence: 99%
“…Prior research on the C4.5 technique covered attention-based lane shifts and a highway collision risk prediction model [9]. There has also been prior research on software risk, specifically a software vulnerability management methodology to reduce system risk and attack surface [10]. The approach and process of software engineering in blockchain-oriented software development are also covered in later studies [11].…”
Section: Introductionmentioning
confidence: 99%