Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Vulnerability Discovery Model
Known as:
V D M
, VDM - Vulnerability Discovery Model
, VDM
Expand
Vulnerability Discovery Model (VDM) is used to estimate future vulnerability discovery process/trend.There are several VDMs: * Alhazmi-Malaiya: Time…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Attack (computing)
IT risk
Information security
Threat (computer)
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Gray-Box Vulnerability Discovery Model Based on Path Coverage
Chunlai Du
,
Xingbang Tan
,
Yanhui Guo
International Conference on Adaptive and…
2019
Corpus ID: 197660568
With the increasing amount of codes and their complexity, the manual method of exploiting vulnerabilities is no longer able to…
Expand
2018
2018
Predicting vulnerability discovery rate using past versions of a software
Fok Kar Wai
,
Wee-Yong Lim
,
Dinil Mon Divakaran
,
V. Thing
International Conference on Service Operations…
2018
Corpus ID: 52912886
A vulnerability discovery model (VDM) describes the number of security vulnerabilities for a software across time. Several models…
Expand
2017
2017
Effort and coverage dependent vulnerability discovery modeling
Yogita Kansal
,
P. K. Kapur
,
U. Kumar
,
Deepak Kumar
2nd International Conference on Telecommunication…
2017
Corpus ID: 5048039
In this paper, our primary focus is to propose a generalized mathematical model that can discover potential vulnerabilities on…
Expand
2017
2017
User-based multi-upgradation vulnerability discovery model
Swati Narang
,
P. K. Kapur
,
D. Damodaran
,
A. K. Shrivastava
6th International Conference on Reliability…
2017
Corpus ID: 5112087
A software practice like code reusability in the successive upgradations of the particular software is increasing vigorously. The…
Expand
2016
2016
Periodicity in software vulnerability discovery, patching and exploitation
Hyunchul Joh
,
Y. Malaiya
International Journal of Information Security
2016
Corpus ID: 25620552
Periodicity in key processes related to software vulnerabilities need to be taken into account for assessing security at a given…
Expand
2014
2014
Modeling Skewness in Vulnerability Discovery
Hyunchul Joh
,
Y. Malaiya
Quality and Reliability Engineering International
2014
Corpus ID: 8530875
A vulnerability discovery model attempts to model the rate at which the vulnerabilities are discovered in a software product…
Expand
2013
2013
Vulnerability Discovery Models for Database Management System
D. S. Yoon
,
Tae-Sung Kim
,
Duk SU Kim
2013
Corpus ID: 18606369
The quantitative analysis of software security vulnerabilities has a direct effect on software quality management and development…
Expand
2012
2012
RFID Application Vulnerability Discovery Model
Chen Tie-min
2012
Corpus ID: 63415591
Based on the study and classification of RFID system security,a vulnerability discovery model was proposed,which includes TR…
Expand
2012
2012
SIP vulnerability discovery model in IMS based on Fuzz testing
Xie Xiao-long
2012
Corpus ID: 63961957
To effectively discover the vulnerability in the communication process of SIP protocol in the IP multimedia subsystem of 3G core…
Expand
2009
2009
Vulnerability Discovery Model Based on Market Share for Operating Systems
Ye Fei
2009
Corpus ID: 62953541
Essentially,vulnerability is a kind of software defect dissatisfying the security requirements.Research on the process of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE