Academic literature on the topic 'Vulnerability discovery model (VDM)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vulnerability discovery model (VDM).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Vulnerability discovery model (VDM)"
Sharma, Ruchi, Ritu Sibal, and A. K. Shrivastava. "Vulnerability Discovery Modeling for Open and Closed Source Software." International Journal of Secure Software Engineering 7, no. 4 (2016): 19–38. http://dx.doi.org/10.4018/ijsse.2016100102.
Full textWang, Xiajing, Rui Ma, Binbin Li, Donghai Tian, and Xuefei Wang. "E-WBM: An Effort-Based Vulnerability Discovery Model." IEEE Access 7 (2019): 44276–92. http://dx.doi.org/10.1109/access.2019.2907977.
Full textTaib, Abidah Hj Mat, Wan Nor Ashiqin Wan Ali, and Nurul Sharidah Shaari. "ICMPV6 Vulnerability." International Journal of Mobile Computing and Multimedia Communications 5, no. 2 (2013): 78–100. http://dx.doi.org/10.4018/jmcmc.2013040106.
Full textKansal, Yogita, P. K. Kapur, Uday Kumar, and Deepak Kumar. "User-dependent vulnerability discovery model and its interdisciplinary nature." Life Cycle Reliability and Safety Engineering 6, no. 1 (2017): 23–29. http://dx.doi.org/10.1007/s41872-017-0003-y.
Full textJohnston, Reuben, Shahryar Sarkani, Thomas Mazzuchi, Thomas Holzer, and Timothy Eveleigh. "Bayesian-model averaging using MCMCBayes for web-browser vulnerability discovery." Reliability Engineering & System Safety 183 (March 2019): 341–59. http://dx.doi.org/10.1016/j.ress.2018.11.030.
Full textBhatt, Navneet, Adarsh Anand, V. S. S. Yadavalli, and Vijay Kumar. "Modeling and Characterizing Software Vulnerabilities." International Journal of Mathematical, Engineering and Management Sciences 2, no. 4 (2017): 288–99. http://dx.doi.org/10.33889/ijmems.2017.2.4-022.
Full textAnand, Adarsh, Navneet Bhatt, and Deepti Aggrawal. "Modeling Software Patch Management Based on Vulnerabilities Discovered." International Journal of Reliability, Quality and Safety Engineering 27, no. 02 (2019): 2040003. http://dx.doi.org/10.1142/s0218539320400033.
Full textYuan, Xue, Guanjun Lin, Yonghang Tai, and Jun Zhang. "Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization." Security and Communication Networks 2022 (January 18, 2022): 1–12. http://dx.doi.org/10.1155/2022/5203217.
Full textU. Rahane, Kavita, and A. B. Pawar. "A REVIEW ON CYBERSECURITY VULNERABILITY DISCOVERY AND MITIGATION MODEL IN SMART COMPUTING." International Journal of Engineering Applied Sciences and Technology 09, no. 05 (2024): 68–77. http://dx.doi.org/10.33564/ijeast.2024.v09i05.008.
Full textNarang, Swati, P. K. Kapur, D. Damodaran, and A. K. Shrivastava. "Bi-Criterion Problem to Determine Optimal Vulnerability Discovery and Patching Time." International Journal of Reliability, Quality and Safety Engineering 25, no. 01 (2018): 1850002. http://dx.doi.org/10.1142/s021853931850002x.
Full textDissertations / Theses on the topic "Vulnerability discovery model (VDM)"
Narciso, André Filipe Tarrucha. "Industrial IT security management supported by an asset management database." Master's thesis, 2019. http://hdl.handle.net/10071/22227.
Full textBook chapters on the topic "Vulnerability discovery model (VDM)"
Anand, Adarsh, Navneet Bhatt, and Omar H. Alhazmi. "Vulnerability Discovery Models (VDMs)." In Software Vulnerability Discovery Process: Concepts and Applications. River Publishers, 2024. https://doi.org/10.1201/9781003605690-3.
Full textZhou, Ke, Jieren Cheng, Hui Li, Yuming Yuan, Le Liu, and Xiulai Li. "SC-VDM: A Lightweight Smart Contract Vulnerability Detection Model." In Data Mining and Big Data. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-7476-1_13.
Full textDu, Chunlai, Xingbang Tan, and Yanhui Guo. "A Gray-Box Vulnerability Discovery Model Based on Path Coverage." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24268-8_1.
Full textColvin, Robert J., and Roger C. Su. "Structural Operational Semantics for Functional and Security Verification of Pipelined Processors." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-98668-0_18.
Full textAlauthman, Mohammad, Ammar Almomani, Samer Aoudi, Ahmad al-Qerem, and Amjad Aldweesh. "Automated Vulnerability Discovery Generative AI in Offensive Security." In Advances in Computational Intelligence and Robotics. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-0832-6.ch013.
Full textZheng, Junjun, Hiroyuki Okamura, and Tadashi Dohi. "Pull-Type Security Patch Management in Intrusion Tolerant Systems: Modeling and Analysis." In Maintenance Management - Current Challenges, New Developments, and Future Directions. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.105766.
Full textConference papers on the topic "Vulnerability discovery model (VDM)"
Narang, Swati, P. K. Kapur, D. Damodaran, and A. K. Shrivastava. "User-based multi-upgradation vulnerability discovery model." In 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2017. http://dx.doi.org/10.1109/icrito.2017.8342459.
Full textShukla, Ankur, and Basel Katt. "Change Point Problem in Security Vulnerability Discovery Model." In 2019 International Conference on Software Security and Assurance (ICSSA). IEEE, 2019. http://dx.doi.org/10.1109/icssa48308.2019.00010.
Full textJabeen, Gul, Luo Ping, Junaid Akram, and Akber Aman Shah. "An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network." In The 31st International Conference on Software Engineering and Knowledge Engineering. KSI Research Inc. and Knowledge Systems Institute Graduate School, 2019. http://dx.doi.org/10.18293/seke2019-168.
Full textWen Tang, Ai-Fen Sui, and Wolfgang Schmid. "A model guided security vulnerability discovery approach for network protocol implementation." In 2011 IEEE 13th International Conference on Communication Technology (ICCT). IEEE, 2011. http://dx.doi.org/10.1109/icct.2011.6157962.
Full textShrivastava, A. K., Ruchi Sharma, and P. K. Kapur. "Vulnerability discovery model for a software system using stochastic differential equation." In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7154992.
Full textYang, Shang yang, and Long yun Zhang. "Application of fuzzy variable set model to evaluation of agriculture drought vulnerability." In 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2010. http://dx.doi.org/10.1109/fskd.2010.5569201.
Full textSorrentino, Julia, Priscila Silva, Gaspard Baye, Gokhan Kul, and Lance Fiondella. "Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation (Practical Experience Report)." In 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2022. http://dx.doi.org/10.1109/issre55969.2022.00025.
Full textEnsina, L. A., P. E. M. Karvat, E. C. de Almeida, and L. E. S. de Oliveira. "Fault Location in Transmission Lines based on LSTM Model." In Symposium on Knowledge Discovery, Mining and Learning. Sociedade Brasileira de Computação - SBC, 2022. http://dx.doi.org/10.5753/kdmile.2022.227805.
Full textMelo, Eduardo, Elisa Tuler, and Leonardo Rocha. "Combining Data Mining Techniques to Analyse Factors Associated with Allocation of Socioeconomic Resources at IFMG." In Symposium on Knowledge Discovery, Mining and Learning. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/kdmile.2021.17465.
Full textShekhawat, Deependra, and Siddharth Saboo. "Fortifying the Energy Frontier: Overcoming Cybersecurity Challenges in the Oil and Gas Industry Through Resilient Strategies and Innovative Solutions." In ADIPEC. SPE, 2024. http://dx.doi.org/10.2118/222471-ms.
Full text