... | @@ -25,3 +25,9 @@ The aforementioned mechanisms (i.e., toolboxes) are available as standalone Micr |
... | @@ -25,3 +25,9 @@ The aforementioned mechanisms (i.e., toolboxes) are available as standalone Micr |
|
- [Vulnerability Prediction (VP)](Vulnerability-Prediction-(VP))
|
|
- [Vulnerability Prediction (VP)](Vulnerability-Prediction-(VP))
|
|
|
|
|
|
|
|
|
|
|
|
## External Links
|
|
|
|
|
|
|
|
For more information about the Quantitative Security Assessment and Vulnerability Prediction mechanisms we highly recommend the reader to have a look at the following resources:
|
|
|
|
|
|
|
|
- **QSA - Paper** This is a journal publication that describes our novel methodology for assessing the security of software products based on the results of static analysis [link](https://www.researchgate.net/publication/351609948_A_hierarchical_model_for_quantifying_software_security_based_on_static_analysis_alerts_and_software_metrics)
|
|
|
|
- **VP - Paper** This is a conference paper describing the approach that we follow for building text mining-based Vulnerability Prediction Models based on Deep Neural Networks and Word Embeddings [link](https://www.researchgate.net/publication/355475542_An_Empirical_Evaluation_of_the_Usefulness_of_Word_Embedding_Techniques_in_Deep_Learning-based_Vulnerability_Prediction) |
|
|
|
\ No newline at end of file |