Title
An effective computational technique for taxonomic position of security vulnerability in software development.
Abstract
•The computational intelligent technique for the standardization of software development process.•Architecture gives the taxonomy position of potential attack in their software application.•Based on the output, the appropriate security standards are integrate in an optimum way.
Year
DOI
Venue
2018
10.1016/j.jocs.2017.08.003
Journal of Computational Science
Keywords
Field
DocType
Attack pattern,Principal component analysis,Data pre-processing,Normalization,Feed-forward back propagation,Multilayer perceptron
Vulnerability (computing),Application security,Computer science,Computer security,Security engineering,Software security assurance,Theoretical computer science,Vulnerability management,Security pattern,Security information and event management,Computer security model
Journal
Volume
ISSN
Citations 
25
1877-7503
0
PageRank 
References 
Authors
0.34
29
2
Name
Order
Citations
PageRank
Amit Kumar Srivastava100.34
Shishir Kumar27817.06