Awad A. Younis

According to our database1, Awad A. Younis authored at least 12 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

2022
Mapping Zero-Click Attack Behavior into MITRE ATT&CK Mobile: A Systematic Process.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Developing parallel programming and soft skills: A project based learning approach.
J. Parallel Distributed Comput., 2021

2020
Empirical Characterization of the Likelihood of Vulnerability Discovery.
Int. J. Perform. Eng., 2020

A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

2019
Case Study: Using Project Based Learning to Develop Parallel Programing and Soft Skills.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2019

2016
Assessing vulnerability exploitability risk using software properties.
Softw. Qual. J., 2016

Evaluating CVSS Base Score Using Vulnerability Rewards Programs.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System.
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015

2014
Using Software Structure to Predict Vulnerability Exploitation Potential.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014


  Loading...