Title | ||
---|---|---|
An effective computational technique for taxonomic position of security vulnerability in software development. |
Abstract | ||
---|---|---|
•The computational intelligent technique for the standardization of software development process.•Architecture gives the taxonomy position of potential attack in their software application.•Based on the output, the appropriate security standards are integrate in an optimum way. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1016/j.jocs.2017.08.003 | Journal of Computational Science |
Keywords | Field | DocType |
Attack pattern,Principal component analysis,Data pre-processing,Normalization,Feed-forward back propagation,Multilayer perceptron | Vulnerability (computing),Application security,Computer science,Computer security,Security engineering,Software security assurance,Theoretical computer science,Vulnerability management,Security pattern,Security information and event management,Computer security model | Journal |
Volume | ISSN | Citations |
25 | 1877-7503 | 0 |
PageRank | References | Authors |
0.34 | 29 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Amit Kumar Srivastava | 1 | 0 | 0.34 |
Shishir Kumar | 2 | 78 | 17.06 |