2020
DOI: 10.1016/j.cose.2020.101751
|View full text |Cite
|
Sign up to set email alerts
|

A vulnerability analysis and prediction framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…--In P1 [6], researchers classify software artifacts with vulnerabilities by finding a correlation between vulnerabilities and the evolution of the vulnerabilities from its genesis. Based on the evolution of a specific vulnerability, P1 [6] also predicts future appearance probabilities of vulnerability groups. P3 [54] used a fault prediction model to build a vulnerability classification model using metrics such as complexity, code churn, and fault history.…”
Section: A Answer To Rq1: What Research Topics Have Been Investigatementioning
confidence: 99%
See 3 more Smart Citations
“…--In P1 [6], researchers classify software artifacts with vulnerabilities by finding a correlation between vulnerabilities and the evolution of the vulnerabilities from its genesis. Based on the evolution of a specific vulnerability, P1 [6] also predicts future appearance probabilities of vulnerability groups. P3 [54] used a fault prediction model to build a vulnerability classification model using metrics such as complexity, code churn, and fault history.…”
Section: A Answer To Rq1: What Research Topics Have Been Investigatementioning
confidence: 99%
“…Prediction models constructed from the above-mentioned proposed research suffer from a high false-positive rate (P1, P4, P5, P7, P13, P14, P16, P35, P42, P45). Vulnerability classification can exhibit a decrease in recall with an increase of precision for a certain range of classification thresholds as shown in P1 [6]. Classifying Vulnerability Categories: This topic includes publications that construct models to classify the categories of vulnerabilities.…”
Section: --P7 [58] Proposed a Novel Approach Called 'Ltrwes'mentioning
confidence: 99%
See 2 more Smart Citations
“…In (Williams et al, 2020) a framework that uses Topically Supervised Evolution Model (TSEM) model to discover relationships between vulnerabilities and predisposition of software products to attacks and risks is proposed. This work presents the labels of each vulnerability that was analyzed.…”
Section: Introductionmentioning
confidence: 99%