Inconsistent measurement and incorrect detection of software names in security vulnerability reports.
Hongyu SunGuoliang OuZiqiu ZhengLei LiaoHe WangYuqing ZhangPublished in: Comput. Secur. (2023)
Keyphrases
- security vulnerabilities
- security risks
- risk assessment
- detection accuracy
- malware detection
- false alarms
- software tools
- false positives
- security issues
- intrusion detection
- computer systems
- detection method
- software systems
- software architecture
- detection algorithm
- security threats
- network security
- software development
- windows xp
- penetration testing
- business intelligence solutions
- anti virus
- user friendliness
- security policies
- automatic detection
- detection rate
- information security
- access control
- object detection
- keywords
- software design
- security requirements
- software maintenance
- network services
- operating system
- case study