Assessing vulnerability exploitability risk using software properties A Younis, YK Malaiya, I Ray Software Quality Journal, 1-44, 2015 | 84 | 2015 |
To fear or not to fear that is the question: Code characteristics of a vulnerable functionwith an existing exploit A Younis, Y Malaiya, C Anderson, I Ray Proceedings of the sixth ACM conference on data and application security and …, 2016 | 71 | 2016 |
Developing parallel programming and soft skills: A project based learning approach AA Younis, R Sunderraman, M Metzler, AG Bourgeois Journal of Parallel and Distributed Computing 158, 151-163, 2021 | 70 | 2021 |
Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability AA Younis, YK Malaiya, I Ray 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering …, 2014 | 70 | 2014 |
Comparing and evaluating CVSS base metrics and microsoft rating system AA Younis, YK Malaiya 2015 IEEE International Conference on Software Quality, Reliability and …, 2015 | 40 | 2015 |
Modeling learningless vulnerability discovery using a folded distribution A Younis, HC Joh, Y Malaiya Proc. of SAM 11, 617-623, 2011 | 40 | 2011 |
A threat analysis methodology for security requirements elicitation in machine learning based systems C Wilhjelm, AA Younis 2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020 | 32 | 2020 |
Using software structure to predict vulnerability exploitation potential AA Younis, YK Malaiya 2014 IEEE Eighth International Conference on Software Security and …, 2014 | 30 | 2014 |
Evaluating CVSS base score using vulnerability rewards programs A Younis, YK Malaiya, I Ray ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016 | 21 | 2016 |
Case Study: Using Project Based Learning to Develop Parallel Programing and Soft Skills A Younis, R Sunderraman, M Metzler, A Bourgeois IEEE International Parallel and Distributed Processing Symposium Workshops …, 2019 | 19 | 2019 |
Relationship between Attack Surface and Vulnerability Density: A Case Study on Apache HTTP Server AA Younis, YK Malaiya The 2012 International Conference on Internet Computing, pp. 197-203, 2012 | 18 | 2012 |
Mapping Zero-Click Attack Behavior into MITRE ATT&CK Mobile: A Systematic Process AA Younis, Z Daher, B Martin, C Morgan 2022 International Conference on Computational Science and Computational …, 2022 | 6 | 2022 |
Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach AA Younis, Y Hu, R Abdunabi 2023 10th International Conference on Dependable Systems and Their …, 2023 | 2 | 2023 |
User’s Susceptibility Factors to Malware Attacks: A Systemic Literature Review AA Younis, E Stronberg, S Noor International Journal of Computer and Information Engineering 15 (9), 543-554, 2021 | 1 | 2021 |
Empirical characterization of the likelihood of vulnerability discovery C Wilhjelm, T Kotadiya, AA Younis International Journal of Performability Engineering 16 (7), 1008, 2020 | 1 | 2020 |