A Framework For Classification Software Security Using Common Vulnerabilities And Exposures
The main research aim is to investigate what information is necessary to make a formal vulnerability pattern representation.This is done through the usage of formal Backus-Naur-Form syntax for the execution and presented with newly created vulnerability flow diagram.Some future works were also propo...
| Main Author: | Hassan, Nor Hafeizah |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/23353/ http://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=113299 |
| Abstract | Abstract here |
Similar Items
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004)
by: Norkhushaini, Awang
Published: (2004)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Software Classification Using Structure-Based Descriptors
by: Ramadan, Qusai Hussein
Published: (2009)
by: Ramadan, Qusai Hussein
Published: (2009)
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020)
by: Mustafa, Nuridawati
Published: (2020)
A Software Requirements Defect Management Approach Using Negotiation Technique To Improve Software Requirements Quality
by: Rosmadi, Nurul Atikah
Published: (2018)
by: Rosmadi, Nurul Atikah
Published: (2018)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
An integrated software quality model in a fuzzy analytical hierarchy process-based evaluation framework for e-learning software / Ahmad Fadli Saad
by: Ahmad Fadli , Saad
Published: (2017)
by: Ahmad Fadli , Saad
Published: (2017)
Tool Enhancement For Collaborative Software Engineering Education
by: Utomo, Danang Wahyu
Published: (2014)
by: Utomo, Danang Wahyu
Published: (2014)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Customization Of Requirements Modeling Tool For Software Engineering Education
by: Subhiyakto, Egia Rosi
Published: (2014)
by: Subhiyakto, Egia Rosi
Published: (2014)
A semantic interoperability framework for software as a service systems in cloud computing environments / Reza Rezaei
by: Reza, Rezaei
Published: (2014)
by: Reza, Rezaei
Published: (2014)
Identify Human Error In Using Mobile Device That Lead To Security Threat
by: Abdul Mubin, Norzul Masri
Published: (2017)
by: Abdul Mubin, Norzul Masri
Published: (2017)
Managing Software Project Risks Using Stepwise And Fuzzy Regression Analysis Modelling Techniques
by: Abdelrafe M.S., Elzamly
Published: (2016)
by: Abdelrafe M.S., Elzamly
Published: (2016)
Estimation technique for software project planning
by: Periasamy, Sobah
Published: (2010)
by: Periasamy, Sobah
Published: (2010)
Development of SecureMet: A Tool for Aligning Security Metrics and Organizations Security Objectives
by: Noraini, Mohd Noor
Published: (2011)
by: Noraini, Mohd Noor
Published: (2011)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
An enhanced malay named entity recognition using clustering and classification approach for crime textual data analysis
by: Salleh, Muhammad Sharilazlan
Published: (2018)
by: Salleh, Muhammad Sharilazlan
Published: (2018)
Gamification For Improving Student Engagement In Software Engineering Subject : A Case Study In UTeM
by: Ab Hamid, Nur Faiqah
Published: (2016)
by: Ab Hamid, Nur Faiqah
Published: (2016)
Halal Computerised Systems Framework For The Halal Pharmaceuticals
by: Raja Rina, Raja Ikram
Published: (2013)
by: Raja Rina, Raja Ikram
Published: (2013)
Comparative analysis of software reusability attributes in web and mobile applications
by: Dhaya Nor, Beshar
Published: (2015)
by: Dhaya Nor, Beshar
Published: (2015)
Comparative analysis for performance measurements of software testing between mobile applications and web applications
by: Hassan Muhamad, Zainab
Published: (2015)
by: Hassan Muhamad, Zainab
Published: (2015)
Development Of Teleresearch Model Using Open Source Software
by: Rajendaran, Chellappan Pillai
Published: (2008)
by: Rajendaran, Chellappan Pillai
Published: (2008)
Enhancing Accuracy Of Credit Scoring Classification With Imbalance Data Using Synthetic Minority Oversampling Technique-Support Vector Machine (SMOTE-SVM) Model
by: Bingamawa, Muhammad Tosan
Published: (2017)
by: Bingamawa, Muhammad Tosan
Published: (2017)
An Improved Diabetes Risk Prediction Framework : An Indonesian Case Study
by: Sutanto, Daniel Hartono
Published: (2018)
by: Sutanto, Daniel Hartono
Published: (2018)
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
by: Affandy
Published: (2015)
by: Affandy
Published: (2015)
Classification of water quality using artificial neural network
by: Sulaiman, Khadijah
Published: (2020)
by: Sulaiman, Khadijah
Published: (2020)
Comparative analysis between FPA and COCOMO techniques for software cost estimation
by: Ali Moftah, Abu Baker
Published: (2014)
by: Ali Moftah, Abu Baker
Published: (2014)
Controller placement mechanism in software defined network using k-median algorithm
by: Fahad, Noor Saad
Published: (2016)
by: Fahad, Noor Saad
Published: (2016)
Software architecture in project management / Looi Kum Yeng
by: Looi, Kum Yeng
Published: (2001)
by: Looi, Kum Yeng
Published: (2001)
Application Software Maintenance Process : A Comparative Study
by: Suhana, Saidin
Published: (2004)
by: Suhana, Saidin
Published: (2004)
Classification of stress based on speech features
by: Jasim, Arshed Ahmed
Published: (2014)
by: Jasim, Arshed Ahmed
Published: (2014)
Classification of Capital Expenditures and Revenue Expenditures Using Neural Network Model
by: Abolgasim, Adnan Ali
Published: (2008)
by: Abolgasim, Adnan Ali
Published: (2008)
Softrisk : prototype for software risk management / Ayad Ali Kashlaf.
by: Kashlaf, Ayad Ali
Published: (1999)
by: Kashlaf, Ayad Ali
Published: (1999)
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
by: Hasnira, Md. Lazim
Published: (2004)
by: Hasnira, Md. Lazim
Published: (2004)
Social cognitive framework for secure information sharing on Islamic NGO social media / Nurul’Adilah Nazri
by: Nurul’Adilah , Nazri
Published: (2022)
by: Nurul’Adilah , Nazri
Published: (2022)
Software risk management tool : the statistical manager / Siah Guat Choon
by: Siah, Guat Choon
Published: (1999)
by: Siah, Guat Choon
Published: (1999)
Data Mining Classification Techniques and Performances on Medical Data
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
by: Benyehmad, Yahyia Mohammed M. Ali
Published: (2006)
Service based load balance mechanism using software-defined networks / Ahmed Abdelaziz Abdelltif Osman
by: Ahmed Abdelaziz, Abdelltif Osman
Published: (2017)
by: Ahmed Abdelaziz, Abdelltif Osman
Published: (2017)
Hybrid convergence analysis model for large-scale software projects / Vasuthevan Balakrishnan.
by: Balakrishnan, Vasuthevan
Published: (1999)
by: Balakrishnan, Vasuthevan
Published: (1999)
Modified anfis architecture with less computational complexities for classification problems
by: Talpur, Noureen
Published: (2018)
by: Talpur, Noureen
Published: (2018)
Similar Items
-
Comparing the Vulnerability of Password Security on Windows XP Profesional and Red Hat Linux 9
by: Norkhushaini, Awang
Published: (2004) -
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021) -
Software Classification Using Structure-Based Descriptors
by: Ramadan, Qusai Hussein
Published: (2009) -
A Template-Based Approach To Write Complete Security Requirements For Software Development Environment
by: Mustafa, Nuridawati
Published: (2020) -
A Software Requirements Defect Management Approach Using Negotiation Technique To Improve Software Requirements Quality
by: Rosmadi, Nurul Atikah
Published: (2018)
