Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Software vulnerability). Showing records 1 – 30 of 36 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


Penn State University

1. Xu, Jun. BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS.

Degree: 2018, Penn State University

Software systems are expanding into every aspect of human society. Accompanying thisexpansion comes a substantial growth of motivated adversaries and sophisticated attacks.This pair of impulses… (more)

Subjects/Keywords: Software security; Software crash diagnosis; Software vulnerability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, J. (2018). BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS. (Thesis). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/15418jxx13

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xu, Jun. “BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS.” 2018. Thesis, Penn State University. Accessed July 16, 2019. https://etda.libraries.psu.edu/catalog/15418jxx13.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xu, Jun. “BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS.” 2018. Web. 16 Jul 2019.

Vancouver:

Xu J. BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS. [Internet] [Thesis]. Penn State University; 2018. [cited 2019 Jul 16]. Available from: https://etda.libraries.psu.edu/catalog/15418jxx13.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xu J. BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS. [Thesis]. Penn State University; 2018. Available from: https://etda.libraries.psu.edu/catalog/15418jxx13

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

2. Cabrey, Craig. Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project.

Degree: MS, Software Engineering (GCCIS), 2016, Rochester Institute of Technology

  As the world continues to embrace a completely digital society in all aspects of life, the ever present threat of a security flaw in… (more)

Subjects/Keywords: Open source; Software evolution; Software mining; Software security; Vulnerability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cabrey, C. (2016). Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9212

Chicago Manual of Style (16th Edition):

Cabrey, Craig. “Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project.” 2016. Masters Thesis, Rochester Institute of Technology. Accessed July 16, 2019. https://scholarworks.rit.edu/theses/9212.

MLA Handbook (7th Edition):

Cabrey, Craig. “Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project.” 2016. Web. 16 Jul 2019.

Vancouver:

Cabrey C. Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project. [Internet] [Masters thesis]. Rochester Institute of Technology; 2016. [cited 2019 Jul 16]. Available from: https://scholarworks.rit.edu/theses/9212.

Council of Science Editors:

Cabrey C. Identifying the Presence of Known Vulnerabilities in the Versions of a Software Project. [Masters Thesis]. Rochester Institute of Technology; 2016. Available from: https://scholarworks.rit.edu/theses/9212


Penn State University

3. Zhao, Mingyi. Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration.

Degree: PhD, Information Sciences and Technology, 2016, Penn State University

 In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions,… (more)

Subjects/Keywords: software vulnerability; bug bounty; memory corruption; software diversity; crowdsourcing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhao, M. (2016). Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/13391muz127

Chicago Manual of Style (16th Edition):

Zhao, Mingyi. “Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration.” 2016. Doctoral Dissertation, Penn State University. Accessed July 16, 2019. https://etda.libraries.psu.edu/catalog/13391muz127.

MLA Handbook (7th Edition):

Zhao, Mingyi. “Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration.” 2016. Web. 16 Jul 2019.

Vancouver:

Zhao M. Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration. [Internet] [Doctoral dissertation]. Penn State University; 2016. [cited 2019 Jul 16]. Available from: https://etda.libraries.psu.edu/catalog/13391muz127.

Council of Science Editors:

Zhao M. Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration. [Doctoral Dissertation]. Penn State University; 2016. Available from: https://etda.libraries.psu.edu/catalog/13391muz127


University of Pennsylvania

4. Clark, Saender Aren. The Software Vulnerability Ecosystem: Software Development In The Context Of Adversarial Behavior.

Degree: 2016, University of Pennsylvania

Software vulnerabilities are the root cause of many computer system security fail- ures. This dissertation addresses software vulnerabilities in the context of a software lifecycle,… (more)

Subjects/Keywords: Adaptive Software Defense; Computer Security; Cyber Security; Secure Software Development; Software Vulnerability Discovery; Software Vulnerability Ecosystem; Computer Sciences; Databases and Information Systems; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Clark, S. A. (2016). The Software Vulnerability Ecosystem: Software Development In The Context Of Adversarial Behavior. (Thesis). University of Pennsylvania. Retrieved from https://repository.upenn.edu/edissertations/2233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Clark, Saender Aren. “The Software Vulnerability Ecosystem: Software Development In The Context Of Adversarial Behavior.” 2016. Thesis, University of Pennsylvania. Accessed July 16, 2019. https://repository.upenn.edu/edissertations/2233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Clark, Saender Aren. “The Software Vulnerability Ecosystem: Software Development In The Context Of Adversarial Behavior.” 2016. Web. 16 Jul 2019.

Vancouver:

Clark SA. The Software Vulnerability Ecosystem: Software Development In The Context Of Adversarial Behavior. [Internet] [Thesis]. University of Pennsylvania; 2016. [cited 2019 Jul 16]. Available from: https://repository.upenn.edu/edissertations/2233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Clark SA. The Software Vulnerability Ecosystem: Software Development In The Context Of Adversarial Behavior. [Thesis]. University of Pennsylvania; 2016. Available from: https://repository.upenn.edu/edissertations/2233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

5. Okonoboh, Matthias Aifuobhokhan. Real-Time Software Vulnerabilities in Cloud Computing : Challenges and Mitigation Techniques.

Degree: 2011, , School of Computing

  Context: Cloud computing is rapidly emerging in the area of distributed computing. In the meantime, many organizations also attributed the technology to be associated… (more)

Subjects/Keywords: Cloud Computing; Software Vulnerability; System Integrity; Distributed Systems; Computer Sciences; Datavetenskap (datalogi); Software Engineering; Programvaruteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Okonoboh, M. A. (2011). Real-Time Software Vulnerabilities in Cloud Computing : Challenges and Mitigation Techniques. (Thesis). , School of Computing. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2645

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Okonoboh, Matthias Aifuobhokhan. “Real-Time Software Vulnerabilities in Cloud Computing : Challenges and Mitigation Techniques.” 2011. Thesis, , School of Computing. Accessed July 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2645.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Okonoboh, Matthias Aifuobhokhan. “Real-Time Software Vulnerabilities in Cloud Computing : Challenges and Mitigation Techniques.” 2011. Web. 16 Jul 2019.

Vancouver:

Okonoboh MA. Real-Time Software Vulnerabilities in Cloud Computing : Challenges and Mitigation Techniques. [Internet] [Thesis]. , School of Computing; 2011. [cited 2019 Jul 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2645.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Okonoboh MA. Real-Time Software Vulnerabilities in Cloud Computing : Challenges and Mitigation Techniques. [Thesis]. , School of Computing; 2011. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2645

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queens University

6. Mohosina, Amatul. DESERVE: A FRAMEWORK FOR DETECTING PROGRAM SECURITY VULNERABILITY EXPLOITATIONS .

Degree: Electrical & Computer Engineering, 2011, Queens University

 It is difficult to develop a program that is completely free from vulnerabilities. Despite the applications of many approaches to secure programs, vulnerability exploitations occur… (more)

Subjects/Keywords: cross-site scripting; buffer overflow; software engineering; vulnerability monitor; software security; runtime testing; sql injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mohosina, A. (2011). DESERVE: A FRAMEWORK FOR DETECTING PROGRAM SECURITY VULNERABILITY EXPLOITATIONS . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/6734

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mohosina, Amatul. “DESERVE: A FRAMEWORK FOR DETECTING PROGRAM SECURITY VULNERABILITY EXPLOITATIONS .” 2011. Thesis, Queens University. Accessed July 16, 2019. http://hdl.handle.net/1974/6734.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mohosina, Amatul. “DESERVE: A FRAMEWORK FOR DETECTING PROGRAM SECURITY VULNERABILITY EXPLOITATIONS .” 2011. Web. 16 Jul 2019.

Vancouver:

Mohosina A. DESERVE: A FRAMEWORK FOR DETECTING PROGRAM SECURITY VULNERABILITY EXPLOITATIONS . [Internet] [Thesis]. Queens University; 2011. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1974/6734.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mohosina A. DESERVE: A FRAMEWORK FOR DETECTING PROGRAM SECURITY VULNERABILITY EXPLOITATIONS . [Thesis]. Queens University; 2011. Available from: http://hdl.handle.net/1974/6734

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Syracuse University

7. Feng, Qian. THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS.

Degree: PhD, Electrical Engineering and Computer Science, 2017, Syracuse University

  The past decade has been witnessing an explosion of various applications and devices. This big-data era challenges the existing security technologies: new analysis techniques… (more)

Subjects/Keywords: Binary Analysis; Machine Learning; Memory Forensics; Software Security; Vulnerability Search; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Feng, Q. (2017). THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS. (Doctoral Dissertation). Syracuse University. Retrieved from https://surface.syr.edu/etd/719

Chicago Manual of Style (16th Edition):

Feng, Qian. “THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS.” 2017. Doctoral Dissertation, Syracuse University. Accessed July 16, 2019. https://surface.syr.edu/etd/719.

MLA Handbook (7th Edition):

Feng, Qian. “THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS.” 2017. Web. 16 Jul 2019.

Vancouver:

Feng Q. THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS. [Internet] [Doctoral dissertation]. Syracuse University; 2017. [cited 2019 Jul 16]. Available from: https://surface.syr.edu/etd/719.

Council of Science Editors:

Feng Q. THE SCALABLE AND ACCOUNTABLE BINARY CODE SEARCH AND ITS APPLICATIONS. [Doctoral Dissertation]. Syracuse University; 2017. Available from: https://surface.syr.edu/etd/719


Iowa State University

8. Pham, Nam Hoai. Detection of recurring software vulnerabilities.

Degree: 2010, Iowa State University

Software security vulnerabilities are discovered on an almost daily basis and have caused substantial damage. It is vital to be able to detect and resolve… (more)

Subjects/Keywords: Detection; Recurring; Software Vulnerability; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pham, N. H. (2010). Detection of recurring software vulnerabilities. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/11590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pham, Nam Hoai. “Detection of recurring software vulnerabilities.” 2010. Thesis, Iowa State University. Accessed July 16, 2019. https://lib.dr.iastate.edu/etd/11590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pham, Nam Hoai. “Detection of recurring software vulnerabilities.” 2010. Web. 16 Jul 2019.

Vancouver:

Pham NH. Detection of recurring software vulnerabilities. [Internet] [Thesis]. Iowa State University; 2010. [cited 2019 Jul 16]. Available from: https://lib.dr.iastate.edu/etd/11590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pham NH. Detection of recurring software vulnerabilities. [Thesis]. Iowa State University; 2010. Available from: https://lib.dr.iastate.edu/etd/11590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Georgia

9. Yin, Yue. Automated generating CTF challenges with program analysis tools resistance.

Degree: PhD, Computer Science, 2018, University of Georgia

 Capture the Flag(CTF) games and competitions have become popular today. Good CTF exercises are not only good approach for learning Cyber Security concepts and techniques… (more)

Subjects/Keywords: Capture-the-Flag(CTF); Software Vulnerability; Fuzzing; Debugging

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yin, Y. (2018). Automated generating CTF challenges with program analysis tools resistance. (Doctoral Dissertation). University of Georgia. Retrieved from http://hdl.handle.net/10724/38613

Chicago Manual of Style (16th Edition):

Yin, Yue. “Automated generating CTF challenges with program analysis tools resistance.” 2018. Doctoral Dissertation, University of Georgia. Accessed July 16, 2019. http://hdl.handle.net/10724/38613.

MLA Handbook (7th Edition):

Yin, Yue. “Automated generating CTF challenges with program analysis tools resistance.” 2018. Web. 16 Jul 2019.

Vancouver:

Yin Y. Automated generating CTF challenges with program analysis tools resistance. [Internet] [Doctoral dissertation]. University of Georgia; 2018. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/10724/38613.

Council of Science Editors:

Yin Y. Automated generating CTF challenges with program analysis tools resistance. [Doctoral Dissertation]. University of Georgia; 2018. Available from: http://hdl.handle.net/10724/38613

10. Lioupras, Ioannis. Don’t let my Heart bleed! : An event study methodology in Heartbleed vulnerability case.

Degree: Informatics, 2014, Umeå University

  Due to the rapid evolution of technology, IT software has become incredibly complex. However the human factor still has a very important role on… (more)

Subjects/Keywords: software vulnerability; IT risk management; disclosure policies; event study methodology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lioupras, I. (2014). Don’t let my Heart bleed! : An event study methodology in Heartbleed vulnerability case. (Thesis). Umeå University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-90126

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lioupras, Ioannis. “Don’t let my Heart bleed! : An event study methodology in Heartbleed vulnerability case.” 2014. Thesis, Umeå University. Accessed July 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-90126.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lioupras, Ioannis. “Don’t let my Heart bleed! : An event study methodology in Heartbleed vulnerability case.” 2014. Web. 16 Jul 2019.

Vancouver:

Lioupras I. Don’t let my Heart bleed! : An event study methodology in Heartbleed vulnerability case. [Internet] [Thesis]. Umeå University; 2014. [cited 2019 Jul 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-90126.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lioupras I. Don’t let my Heart bleed! : An event study methodology in Heartbleed vulnerability case. [Thesis]. Umeå University; 2014. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-90126

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Kansas

11. Hein, Daniel D. A New Approach for Predicting Security Vulnerability Severity in Attack Prone Software Using Architecture and Repository Mined Change Metrics.

Degree: PhD, Electrical Engineering & Computer Science, 2017, University of Kansas

 Billions of dollars are lost every year to successful cyber attacks that are fundamentally enabled by software vulnerabilities. Modern cyber attacks increasingly threaten individuals, organizations,… (more)

Subjects/Keywords: Computer science; Information science; Information technology; Cybersecurity; Data Mining; Empirical Software Engineering; Mining Software Repositories; Software Security; Vulnerability Prediction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hein, D. D. (2017). A New Approach for Predicting Security Vulnerability Severity in Attack Prone Software Using Architecture and Repository Mined Change Metrics. (Doctoral Dissertation). University of Kansas. Retrieved from http://hdl.handle.net/1808/25861

Chicago Manual of Style (16th Edition):

Hein, Daniel D. “A New Approach for Predicting Security Vulnerability Severity in Attack Prone Software Using Architecture and Repository Mined Change Metrics.” 2017. Doctoral Dissertation, University of Kansas. Accessed July 16, 2019. http://hdl.handle.net/1808/25861.

MLA Handbook (7th Edition):

Hein, Daniel D. “A New Approach for Predicting Security Vulnerability Severity in Attack Prone Software Using Architecture and Repository Mined Change Metrics.” 2017. Web. 16 Jul 2019.

Vancouver:

Hein DD. A New Approach for Predicting Security Vulnerability Severity in Attack Prone Software Using Architecture and Repository Mined Change Metrics. [Internet] [Doctoral dissertation]. University of Kansas; 2017. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1808/25861.

Council of Science Editors:

Hein DD. A New Approach for Predicting Security Vulnerability Severity in Attack Prone Software Using Architecture and Repository Mined Change Metrics. [Doctoral Dissertation]. University of Kansas; 2017. Available from: http://hdl.handle.net/1808/25861


Queens University

12. Chowdhury, Istehad. USING COMPLEXITY, COUPLING, AND COHESION METRICS AS EARLY INDICATORS OF VULNERABILITIES .

Degree: Electrical and Computer Engineering, 2009, Queens University

Software security failures are common and the problem is growing. A vulnerability is a weakness in the software that, when exploited, causes a security failure.… (more)

Subjects/Keywords: Software metrics; Complexity, coupling, and cohesion metrics; Vulnerability prediction; Software security; Mining software engineering data; Empirical study

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chowdhury, I. (2009). USING COMPLEXITY, COUPLING, AND COHESION METRICS AS EARLY INDICATORS OF VULNERABILITIES . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/5244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chowdhury, Istehad. “USING COMPLEXITY, COUPLING, AND COHESION METRICS AS EARLY INDICATORS OF VULNERABILITIES .” 2009. Thesis, Queens University. Accessed July 16, 2019. http://hdl.handle.net/1974/5244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chowdhury, Istehad. “USING COMPLEXITY, COUPLING, AND COHESION METRICS AS EARLY INDICATORS OF VULNERABILITIES .” 2009. Web. 16 Jul 2019.

Vancouver:

Chowdhury I. USING COMPLEXITY, COUPLING, AND COHESION METRICS AS EARLY INDICATORS OF VULNERABILITIES . [Internet] [Thesis]. Queens University; 2009. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1974/5244.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chowdhury I. USING COMPLEXITY, COUPLING, AND COHESION METRICS AS EARLY INDICATORS OF VULNERABILITIES . [Thesis]. Queens University; 2009. Available from: http://hdl.handle.net/1974/5244

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

13. Mussa, Awad A. Younis. Quantifying the security risk of discovering and exploiting software vulnerabilities.

Degree: PhD, Computer Science, 2016, Colorado State University

 Most of the attacks on computer systems and networks are enabled by vulnerabilities in a software. Assessing the security risk associated with those vulnerabilities is… (more)

Subjects/Keywords: software security; vulnerabilities exploitation; vulnerability rewards program and time to vulnerability disclosure; software vulnerabilities; cvss and OWASP metrics; vulnerabilities risk and severity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mussa, A. A. Y. (2016). Quantifying the security risk of discovering and exploiting software vulnerabilities. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/176641

Chicago Manual of Style (16th Edition):

Mussa, Awad A Younis. “Quantifying the security risk of discovering and exploiting software vulnerabilities.” 2016. Doctoral Dissertation, Colorado State University. Accessed July 16, 2019. http://hdl.handle.net/10217/176641.

MLA Handbook (7th Edition):

Mussa, Awad A Younis. “Quantifying the security risk of discovering and exploiting software vulnerabilities.” 2016. Web. 16 Jul 2019.

Vancouver:

Mussa AAY. Quantifying the security risk of discovering and exploiting software vulnerabilities. [Internet] [Doctoral dissertation]. Colorado State University; 2016. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/10217/176641.

Council of Science Editors:

Mussa AAY. Quantifying the security risk of discovering and exploiting software vulnerabilities. [Doctoral Dissertation]. Colorado State University; 2016. Available from: http://hdl.handle.net/10217/176641

14. Luiz Otávio Duarte. Desenvolvimento de um ambiente para análise de códigos-fonte com ênfase em segurança.

Degree: 2007, Instituto Nacional de Pesquisas Espaciais

Este trabalho apresenta uma proposta de ambiente para análise de códigos-fonte com enfase em segurança, tendo como objetivo primordial auxiliar desenvolvedores a encontrar reais vulnerabilidades… (more)

Subjects/Keywords: segurança; vulnerabilidade; linguagens de programação; verificação de programas; confiabilidade de software; security; vulnerability; programming languages; program verification; software reability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Duarte, L. O. (2007). Desenvolvimento de um ambiente para análise de códigos-fonte com ênfase em segurança. (Thesis). Instituto Nacional de Pesquisas Espaciais. Retrieved from http://urlib.net/sid.inpe.br/[email protected]/2007/04.23.11.26

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Duarte, Luiz Otávio. “Desenvolvimento de um ambiente para análise de códigos-fonte com ênfase em segurança.” 2007. Thesis, Instituto Nacional de Pesquisas Espaciais. Accessed July 16, 2019. http://urlib.net/sid.inpe.br/[email protected]/2007/04.23.11.26.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Duarte, Luiz Otávio. “Desenvolvimento de um ambiente para análise de códigos-fonte com ênfase em segurança.” 2007. Web. 16 Jul 2019.

Vancouver:

Duarte LO. Desenvolvimento de um ambiente para análise de códigos-fonte com ênfase em segurança. [Internet] [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2007. [cited 2019 Jul 16]. Available from: http://urlib.net/sid.inpe.br/[email protected]/2007/04.23.11.26.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Duarte LO. Desenvolvimento de um ambiente para análise de códigos-fonte com ênfase em segurança. [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2007. Available from: http://urlib.net/sid.inpe.br/[email protected]/2007/04.23.11.26

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


North Carolina State University

15. Kil, Chongkyung. Mechanisms for Protecting Software Integrity in Networked Systems.

Degree: PhD, Computer Science, 2008, North Carolina State University

 Protecting software integrity is a key to successfully maintain its own credibility and reduce the financial and technical risks caused from a lack of integrity.… (more)

Subjects/Keywords: Software Integrity Protection; Software Vulnerability Identification; Remote Dynamic Attestation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kil, C. (2008). Mechanisms for Protecting Software Integrity in Networked Systems. (Doctoral Dissertation). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/5142

Chicago Manual of Style (16th Edition):

Kil, Chongkyung. “Mechanisms for Protecting Software Integrity in Networked Systems.” 2008. Doctoral Dissertation, North Carolina State University. Accessed July 16, 2019. http://www.lib.ncsu.edu/resolver/1840.16/5142.

MLA Handbook (7th Edition):

Kil, Chongkyung. “Mechanisms for Protecting Software Integrity in Networked Systems.” 2008. Web. 16 Jul 2019.

Vancouver:

Kil C. Mechanisms for Protecting Software Integrity in Networked Systems. [Internet] [Doctoral dissertation]. North Carolina State University; 2008. [cited 2019 Jul 16]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5142.

Council of Science Editors:

Kil C. Mechanisms for Protecting Software Integrity in Networked Systems. [Doctoral Dissertation]. North Carolina State University; 2008. Available from: http://www.lib.ncsu.edu/resolver/1840.16/5142


Queens University

16. Davari, Maryam. Classifying And Predicting Software Security Vulnerabilities based on Reproducibility .

Degree: Computing, Queens University

 Security defects are common in large software systems because of their size and complexity. Although efficient development processes, testing, and maintenance policies are applied to… (more)

Subjects/Keywords: Vulnerability; security failure; hard to reproduce vulnerability; vulnerability classification; software metrics; vulnerability prediction; machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Davari, M. (n.d.). Classifying And Predicting Software Security Vulnerabilities based on Reproducibility . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/15298

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Davari, Maryam. “Classifying And Predicting Software Security Vulnerabilities based on Reproducibility .” Thesis, Queens University. Accessed July 16, 2019. http://hdl.handle.net/1974/15298.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Davari, Maryam. “Classifying And Predicting Software Security Vulnerabilities based on Reproducibility .” Web. 16 Jul 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Davari M. Classifying And Predicting Software Security Vulnerabilities based on Reproducibility . [Internet] [Thesis]. Queens University; [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1974/15298.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Davari M. Classifying And Predicting Software Security Vulnerabilities based on Reproducibility . [Thesis]. Queens University; Available from: http://hdl.handle.net/1974/15298

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

17. Thiago Yamada. Ferramentas de geoprocessamento para análise da vulnerabilidade natural das águas sub-superficiais à poluição, área urbana e seu entorno, município de São Carlos - SP.

Degree: 2007, Universidade Federal de São Carlos

Mais ou menos 97% da água doce disponível para uso da humanidade encontra-se no subsolo, na forma de água subterrânea. Isso fez com que a… (more)

Subjects/Keywords: Água - poluição; Método GOD; Vulnerabilidade natural; Aqüíferos; Software SPRING; AGUA; GOD; Natural vulnerability; Pollution; Groundwater; Geoprocessing; Spring

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yamada, T. (2007). Ferramentas de geoprocessamento para análise da vulnerabilidade natural das águas sub-superficiais à poluição, área urbana e seu entorno, município de São Carlos - SP. (Thesis). Universidade Federal de São Carlos. Retrieved from http://www.bdtd.ufscar.br/htdocs/tedeSimplificado//tde_busca/arquivo.php?codArquivo=1679

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yamada, Thiago. “Ferramentas de geoprocessamento para análise da vulnerabilidade natural das águas sub-superficiais à poluição, área urbana e seu entorno, município de São Carlos - SP.” 2007. Thesis, Universidade Federal de São Carlos. Accessed July 16, 2019. http://www.bdtd.ufscar.br/htdocs/tedeSimplificado//tde_busca/arquivo.php?codArquivo=1679.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yamada, Thiago. “Ferramentas de geoprocessamento para análise da vulnerabilidade natural das águas sub-superficiais à poluição, área urbana e seu entorno, município de São Carlos - SP.” 2007. Web. 16 Jul 2019.

Vancouver:

Yamada T. Ferramentas de geoprocessamento para análise da vulnerabilidade natural das águas sub-superficiais à poluição, área urbana e seu entorno, município de São Carlos - SP. [Internet] [Thesis]. Universidade Federal de São Carlos; 2007. [cited 2019 Jul 16]. Available from: http://www.bdtd.ufscar.br/htdocs/tedeSimplificado//tde_busca/arquivo.php?codArquivo=1679.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yamada T. Ferramentas de geoprocessamento para análise da vulnerabilidade natural das águas sub-superficiais à poluição, área urbana e seu entorno, município de São Carlos - SP. [Thesis]. Universidade Federal de São Carlos; 2007. Available from: http://www.bdtd.ufscar.br/htdocs/tedeSimplificado//tde_busca/arquivo.php?codArquivo=1679

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

18. Zerkane, Salaheddine. Security Analysis and Access Control Enforcement through Software Defined Networks : Analyse de sécurité et renforcement de control d’accès à travers les réseaux programmables.

Degree: Docteur es, Informatique, 2018, Brest

Les réseaux programmables (SDN) sont un paradigme émergent qui promet de résoudre les limitations de l'architecture du réseau conventionnel. Dans cette thèse, nous étudions et… (more)

Subjects/Keywords: Réseaux programmables; Cybersécurité; Pare-feu; Orchestration; Vulnérabilité; Contrôle d’accès; Software Defined Networks; Cyber security; Firewall; Orchestration; Vulnerability; Access Control; 005.8

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zerkane, S. (2018). Security Analysis and Access Control Enforcement through Software Defined Networks : Analyse de sécurité et renforcement de control d’accès à travers les réseaux programmables. (Doctoral Dissertation). Brest. Retrieved from http://www.theses.fr/2018BRES0057

Chicago Manual of Style (16th Edition):

Zerkane, Salaheddine. “Security Analysis and Access Control Enforcement through Software Defined Networks : Analyse de sécurité et renforcement de control d’accès à travers les réseaux programmables.” 2018. Doctoral Dissertation, Brest. Accessed July 16, 2019. http://www.theses.fr/2018BRES0057.

MLA Handbook (7th Edition):

Zerkane, Salaheddine. “Security Analysis and Access Control Enforcement through Software Defined Networks : Analyse de sécurité et renforcement de control d’accès à travers les réseaux programmables.” 2018. Web. 16 Jul 2019.

Vancouver:

Zerkane S. Security Analysis and Access Control Enforcement through Software Defined Networks : Analyse de sécurité et renforcement de control d’accès à travers les réseaux programmables. [Internet] [Doctoral dissertation]. Brest; 2018. [cited 2019 Jul 16]. Available from: http://www.theses.fr/2018BRES0057.

Council of Science Editors:

Zerkane S. Security Analysis and Access Control Enforcement through Software Defined Networks : Analyse de sécurité et renforcement de control d’accès à travers les réseaux programmables. [Doctoral Dissertation]. Brest; 2018. Available from: http://www.theses.fr/2018BRES0057


Colorado State University

19. Joh, HyunChul. Quantitative analyses of software vulnerabilities.

Degree: PhD, Computer Science, 2007, Colorado State University

 There have been numerous studies addressing computer security and software vulnerability management. Most of the time, they have taken a qualitative perspective. In many other… (more)

Subjects/Keywords: modeling; quantitative analysis; risk; security; software; vulnerability discovery process

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Joh, H. (2007). Quantitative analyses of software vulnerabilities. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/70444

Chicago Manual of Style (16th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2007. Doctoral Dissertation, Colorado State University. Accessed July 16, 2019. http://hdl.handle.net/10217/70444.

MLA Handbook (7th Edition):

Joh, HyunChul. “Quantitative analyses of software vulnerabilities.” 2007. Web. 16 Jul 2019.

Vancouver:

Joh H. Quantitative analyses of software vulnerabilities. [Internet] [Doctoral dissertation]. Colorado State University; 2007. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/10217/70444.

Council of Science Editors:

Joh H. Quantitative analyses of software vulnerabilities. [Doctoral Dissertation]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/70444


Brigham Young University

20. Higbee, Matthew Somers. Deriving System Vulnerabilities Using Log Analytics.

Degree: MS, 2015, Brigham Young University

  System Administrators use many of the same tactics that are implemented by hackers to validate the security of their systems, such as port scanning… (more)

Subjects/Keywords: log file; agent; syslog; elasticsearch; logstash; kibana; software inventory; inventory management; vulnerability; port scan; Systems Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Higbee, M. S. (2015). Deriving System Vulnerabilities Using Log Analytics. (Masters Thesis). Brigham Young University. Retrieved from https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7139&context=etd

Chicago Manual of Style (16th Edition):

Higbee, Matthew Somers. “Deriving System Vulnerabilities Using Log Analytics.” 2015. Masters Thesis, Brigham Young University. Accessed July 16, 2019. https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7139&context=etd.

MLA Handbook (7th Edition):

Higbee, Matthew Somers. “Deriving System Vulnerabilities Using Log Analytics.” 2015. Web. 16 Jul 2019.

Vancouver:

Higbee MS. Deriving System Vulnerabilities Using Log Analytics. [Internet] [Masters thesis]. Brigham Young University; 2015. [cited 2019 Jul 16]. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7139&context=etd.

Council of Science Editors:

Higbee MS. Deriving System Vulnerabilities Using Log Analytics. [Masters Thesis]. Brigham Young University; 2015. Available from: https://scholarsarchive.byu.edu/cgi/viewcontent.cgi?article=7139&context=etd

21. Luiz Gustavo Cunha Barbato. Metodologia de identificação de vulnerabilidades em aplicações de pagamento utilizando cartões de crédito.

Degree: 2009, Instituto Nacional de Pesquisas Espaciais

As compras com cartões de pagamento vêm aumentando continuamente. Essa forma de efetuar transações possibilita que os usuários desses recursos realizem compras sem a necessidade… (more)

Subjects/Keywords: segurança de sistemas de informação; engenharia de software; vulnerabilidade; processamento de dados; controle de acesso; computer information security; software engineering; vulnerability; data processing; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Barbato, L. G. C. (2009). Metodologia de identificação de vulnerabilidades em aplicações de pagamento utilizando cartões de crédito. (Thesis). Instituto Nacional de Pesquisas Espaciais. Retrieved from http://urlib.net/sid.inpe.br/[email protected]/2009/08.20.13.22

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Barbato, Luiz Gustavo Cunha. “Metodologia de identificação de vulnerabilidades em aplicações de pagamento utilizando cartões de crédito.” 2009. Thesis, Instituto Nacional de Pesquisas Espaciais. Accessed July 16, 2019. http://urlib.net/sid.inpe.br/[email protected]/2009/08.20.13.22.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Barbato, Luiz Gustavo Cunha. “Metodologia de identificação de vulnerabilidades em aplicações de pagamento utilizando cartões de crédito.” 2009. Web. 16 Jul 2019.

Vancouver:

Barbato LGC. Metodologia de identificação de vulnerabilidades em aplicações de pagamento utilizando cartões de crédito. [Internet] [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2009. [cited 2019 Jul 16]. Available from: http://urlib.net/sid.inpe.br/[email protected]/2009/08.20.13.22.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Barbato LGC. Metodologia de identificação de vulnerabilidades em aplicações de pagamento utilizando cartões de crédito. [Thesis]. Instituto Nacional de Pesquisas Espaciais; 2009. Available from: http://urlib.net/sid.inpe.br/[email protected]/2009/08.20.13.22

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Washington

22. Ogunnaike, Ruth Motunrayo. VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES.

Degree: 2017, University of Washington

 The use of Internet of Things (IoT) devices has grown significantly in the past decade. While IoT is expected to improve life for many by… (more)

Subjects/Keywords: Internet of Things (IoT); IoT Security; OpenFlow; Software Defined Networking(SDN); Vulnerability Detection and Resolution; Computer science; Information technology; Computer engineering; Computer and software systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ogunnaike, R. M. (2017). VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES. (Thesis). University of Washington. Retrieved from http://hdl.handle.net/1773/39894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ogunnaike, Ruth Motunrayo. “VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES.” 2017. Thesis, University of Washington. Accessed July 16, 2019. http://hdl.handle.net/1773/39894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ogunnaike, Ruth Motunrayo. “VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES.” 2017. Web. 16 Jul 2019.

Vancouver:

Ogunnaike RM. VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES. [Internet] [Thesis]. University of Washington; 2017. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1773/39894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ogunnaike RM. VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES. [Thesis]. University of Washington; 2017. Available from: http://hdl.handle.net/1773/39894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

23. Martinsson, Roy. Software Vulnerability Assessment : local search methods.

Degree: 2006, , Department of Systems and Software Engineering

In this thesis, we analyse different ways of detecting application vulnerabilities on installed software. Based on this research, a prototype will be developed that will validate these findings. The prototype will analyse only known vulnerabilities collected from a database and matched with locally collected data.

Subjects/Keywords: Information Security; Vulnerability Scan; Software Update; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martinsson, R. (2006). Software Vulnerability Assessment : local search methods. (Thesis). , Department of Systems and Software Engineering. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4270

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Martinsson, Roy. “Software Vulnerability Assessment : local search methods.” 2006. Thesis, , Department of Systems and Software Engineering. Accessed July 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4270.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Martinsson, Roy. “Software Vulnerability Assessment : local search methods.” 2006. Web. 16 Jul 2019.

Vancouver:

Martinsson R. Software Vulnerability Assessment : local search methods. [Internet] [Thesis]. , Department of Systems and Software Engineering; 2006. [cited 2019 Jul 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4270.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Martinsson R. Software Vulnerability Assessment : local search methods. [Thesis]. , Department of Systems and Software Engineering; 2006. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4270

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université du Luxembourg

24. Thome, Julian. A Scalable and Accurate Hybrid Vulnerability Analysis Framework.

Degree: 2018, Université du Luxembourg

 As the Internet has become an integral part of our everyday life for activities such as e-mail, online-banking, shopping, entertainment, etc., vulnerabilities in Web software(more)

Subjects/Keywords: vulnerability detection; string constraint solving; security auditing; static analysis; search-based software engineering; Engineering, computing & technology :: Computer science [C05]; Ingénierie, informatique & technologie :: Sciences informatiques [C05]

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thome, J. (2018). A Scalable and Accurate Hybrid Vulnerability Analysis Framework. (Doctoral Dissertation). Université du Luxembourg. Retrieved from http://orbilu.uni.lu/handle/10993/35504

Chicago Manual of Style (16th Edition):

Thome, Julian. “A Scalable and Accurate Hybrid Vulnerability Analysis Framework.” 2018. Doctoral Dissertation, Université du Luxembourg. Accessed July 16, 2019. http://orbilu.uni.lu/handle/10993/35504.

MLA Handbook (7th Edition):

Thome, Julian. “A Scalable and Accurate Hybrid Vulnerability Analysis Framework.” 2018. Web. 16 Jul 2019.

Vancouver:

Thome J. A Scalable and Accurate Hybrid Vulnerability Analysis Framework. [Internet] [Doctoral dissertation]. Université du Luxembourg; 2018. [cited 2019 Jul 16]. Available from: http://orbilu.uni.lu/handle/10993/35504.

Council of Science Editors:

Thome J. A Scalable and Accurate Hybrid Vulnerability Analysis Framework. [Doctoral Dissertation]. Université du Luxembourg; 2018. Available from: http://orbilu.uni.lu/handle/10993/35504


University of Southern California

25. Chen, Yue. Software security economics and threat modeling based on attack path analysis; a stakeholder value driven approach.

Degree: PhD, Computer Science, 2007, University of Southern California

 The thesis presents the Threat Modeling Method Based on Attack Path Analysis (T-MAP) which quantifies security threats by calculating the total severity weights of relevant… (more)

Subjects/Keywords: software engineering; security economics; threat modeling; COTS; value based; vulnerability ranking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2007). Software security economics and threat modeling based on attack path analysis; a stakeholder value driven approach. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/595157/rec/5946

Chicago Manual of Style (16th Edition):

Chen, Yue. “Software security economics and threat modeling based on attack path analysis; a stakeholder value driven approach.” 2007. Doctoral Dissertation, University of Southern California. Accessed July 16, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/595157/rec/5946.

MLA Handbook (7th Edition):

Chen, Yue. “Software security economics and threat modeling based on attack path analysis; a stakeholder value driven approach.” 2007. Web. 16 Jul 2019.

Vancouver:

Chen Y. Software security economics and threat modeling based on attack path analysis; a stakeholder value driven approach. [Internet] [Doctoral dissertation]. University of Southern California; 2007. [cited 2019 Jul 16]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/595157/rec/5946.

Council of Science Editors:

Chen Y. Software security economics and threat modeling based on attack path analysis; a stakeholder value driven approach. [Doctoral Dissertation]. University of Southern California; 2007. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/595157/rec/5946

26. Ryder, Evan. Sql Injection Attacks and Countermeasures: a Survey of Website Development Practices.

Degree: 2010, Regis University

 This study involved the development and subsequent use of a bespoke SQL Injection vulnerability scanner to analyze a set of unique approaches to common tasks,… (more)

Subjects/Keywords: Computer Sciences; Physical Sciences and Mathematics; bespoke SQL Injection vulnerability scanner; PHP; MySQL; online scanning software applications; Linux-based system; Regis University MSSIS thesis; College for Professional Studies; MS Software and Information Systems; School of Computer & Information Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ryder, E. (2010). Sql Injection Attacks and Countermeasures: a Survey of Website Development Practices. (Thesis). Regis University. Retrieved from http://epublications.regis.edu/theses/308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ryder, Evan. “Sql Injection Attacks and Countermeasures: a Survey of Website Development Practices.” 2010. Thesis, Regis University. Accessed July 16, 2019. http://epublications.regis.edu/theses/308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ryder, Evan. “Sql Injection Attacks and Countermeasures: a Survey of Website Development Practices.” 2010. Web. 16 Jul 2019.

Vancouver:

Ryder E. Sql Injection Attacks and Countermeasures: a Survey of Website Development Practices. [Internet] [Thesis]. Regis University; 2010. [cited 2019 Jul 16]. Available from: http://epublications.regis.edu/theses/308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ryder E. Sql Injection Attacks and Countermeasures: a Survey of Website Development Practices. [Thesis]. Regis University; 2010. Available from: http://epublications.regis.edu/theses/308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Luleå University of Technology

27. Faiz, Ali. Information security threats against mobile phone services (developer's perspective).

Degree: 2009, Luleå University of Technology

In this study, we have discussed the security of mobile phone services against information security threats during development process. The use of internet has… (more)

Subjects/Keywords: Social Behaviour Law; Information security threats; mobile phones; services; developer's perspective; software development; process; vulnerability methodology; attitude system; IS; awareness; training; improve security; confidentiality; integrity; availability; CIA; cellular phones; malicious; software; viruses; worms; Trojan Horse; Mumtaz; Maqsood; Ali Faiz; Samhälls-; beteendevetenskap; juridik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Faiz, A. (2009). Information security threats against mobile phone services (developer's perspective). (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Faiz, Ali. “Information security threats against mobile phone services (developer's perspective).” 2009. Thesis, Luleå University of Technology. Accessed July 16, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Faiz, Ali. “Information security threats against mobile phone services (developer's perspective).” 2009. Web. 16 Jul 2019.

Vancouver:

Faiz A. Information security threats against mobile phone services (developer's perspective). [Internet] [Thesis]. Luleå University of Technology; 2009. [cited 2019 Jul 16]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42677.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Faiz A. Information security threats against mobile phone services (developer's perspective). [Thesis]. Luleå University of Technology; 2009. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-42677

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

28. Krkoš, Radko. Software pro hledání zranitelných počítačů v síti .

Degree: 2009, Brno University of Technology

 Práca sa zaoberá bezpečnosťou počítačových systémov a sieťovej infraštruktúry. Opisuje problematiku bezpečnostných dier a zranitežností a diskutuje možnosti ochrany pred počítačovými útokmi. Popísáné sú najčastejšie… (more)

Subjects/Keywords: bezpečnosť; počítač; skenovanie; bezpečnostná diera; detekcia; aplikácia; software; security; computer; scanning; vulnerability; detection; application; software

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krkoš, R. (2009). Software pro hledání zranitelných počítačů v síti . (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/17580

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krkoš, Radko. “Software pro hledání zranitelných počítačů v síti .” 2009. Thesis, Brno University of Technology. Accessed July 16, 2019. http://hdl.handle.net/11012/17580.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krkoš, Radko. “Software pro hledání zranitelných počítačů v síti .” 2009. Web. 16 Jul 2019.

Vancouver:

Krkoš R. Software pro hledání zranitelných počítačů v síti . [Internet] [Thesis]. Brno University of Technology; 2009. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/11012/17580.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krkoš R. Software pro hledání zranitelných počítačů v síti . [Thesis]. Brno University of Technology; 2009. Available from: http://hdl.handle.net/11012/17580

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

29. Kim, Jin Yoo. Vulnerability discovery in multiple version software systems : open source and commercial software systems.

Degree: MS(M.S.), Computer Science, 2007, Colorado State University

 The vulnerability discovery process for a program describes the rate at which the vulnerabilities are discovered. A model of the discovery process can be used… (more)

Subjects/Keywords: DBMS; VDM; Apache HTTP Web server; Mysql; database management system; software vulnerability discovery model; Computer viruses; Spyware (Computer software); Computer security  – Methodology; Data protection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, J. Y. (2007). Vulnerability discovery in multiple version software systems : open source and commercial software systems. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/26808

Chicago Manual of Style (16th Edition):

Kim, Jin Yoo. “Vulnerability discovery in multiple version software systems : open source and commercial software systems.” 2007. Masters Thesis, Colorado State University. Accessed July 16, 2019. http://hdl.handle.net/10217/26808.

MLA Handbook (7th Edition):

Kim, Jin Yoo. “Vulnerability discovery in multiple version software systems : open source and commercial software systems.” 2007. Web. 16 Jul 2019.

Vancouver:

Kim JY. Vulnerability discovery in multiple version software systems : open source and commercial software systems. [Internet] [Masters thesis]. Colorado State University; 2007. [cited 2019 Jul 16]. Available from: http://hdl.handle.net/10217/26808.

Council of Science Editors:

Kim JY. Vulnerability discovery in multiple version software systems : open source and commercial software systems. [Masters Thesis]. Colorado State University; 2007. Available from: http://hdl.handle.net/10217/26808


Queens University

30. Elsayed, Marwa. Advancing Security Services for Cloud Applications .

Degree: Computing, Queens University

 With cloud computing taking roots, Software as a Service (SaaS) is transforming the future of Information Technology (IT). SaaS is a modern pervasive software delivery… (more)

Subjects/Keywords: Cloud applications; Security; Security as a Service; Software as a Service; Program analysis; Data analytics; Security Monitoring; Vulnerability Scanning; Cloud Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elsayed, M. (n.d.). Advancing Security Services for Cloud Applications . (Thesis). Queens University. Retrieved from http://hdl.handle.net/1974/24937

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Elsayed, Marwa. “Advancing Security Services for Cloud Applications .” Thesis, Queens University. Accessed July 16, 2019. http://hdl.handle.net/1974/24937.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Elsayed, Marwa. “Advancing Security Services for Cloud Applications .” Web. 16 Jul 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Elsayed M. Advancing Security Services for Cloud Applications . [Internet] [Thesis]. Queens University; [cited 2019 Jul 16]. Available from: http://hdl.handle.net/1974/24937.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

Elsayed M. Advancing Security Services for Cloud Applications . [Thesis]. Queens University; Available from: http://hdl.handle.net/1974/24937

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

[1] [2]

.