<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main"></title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yevheniy</forename><surname>Sierhieiev</surname></persName>
							<email>ysierhieiev@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29016</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Vadym</forename><surname>Paiuk</surname></persName>
							<email>vadympaiuk@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29016</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Anatoliy</forename><surname>Sachenko</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">West Ukrainian National University</orgName>
								<address>
									<addrLine>11 Lvivska Str</addrLine>
									<postCode>46009</postCode>
									<settlement>Ternopil</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrii</forename><surname>Nicheporuk</surname></persName>
							<email>andrey.nicheporuk@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str., 11</addrLine>
									<postCode>29016</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrzej</forename><surname>Kwiecien</surname></persName>
							<email>andrzej.kwiecien@polsl.pl</email>
							<affiliation key="aff2">
								<orgName type="institution">Silesian University of Technology</orgName>
								<address>
									<addrLine>Akademicka str</addrLine>
									<postCode>2А</postCode>
									<settlement>Gliwice</settlement>
									<country key="PL">Poland</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="department">International Workshop on Intelligent Information Technologies and Systems of Information Security</orgName>
								<address>
									<addrLine>March 28</addrLine>
									<postCode>2024</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">138EEBFCBCC2B9E1284165BDE1CB428A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:04+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>vulnerabilies</term>
					<term>cyber security</term>
					<term>threat detection</term>
					<term>cyber defense</term>
					<term>xss</term>
					<term>vulnerable detection</term>
					<term>GBVDM</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This paper presents a novel Graph-based Vulnerability Detection Method (GBVDM) designed to address the growing challenges in software security by leveraging graph theory to enhance the detection of vulnerabilities within software systems. This method constructs a dynamic dependency graph that captures the complex interactions between software components, enabling the identification of vulnerabilities through sophisticated analysis of these interactions. The GBVDM utilizes depth-first and breadth-first search algorithms to explore potential vulnerabilities, integrating machine learning techniques to improve the prediction and identification of new and existing security threats. Through an in-depth examination of various vulnerability types, including SQL injections, Cross-Site Scripting (XSS), and buffer overflows, the paper evaluates the effectiveness of GBVDM against traditional vulnerability detection methods. The method's efficacy is demonstrated through experimental validation on software designed for Windows 10, highlighting its superior ability to detect vulnerabilities with higher accuracy and a lower rate of false positives compared to Static Application Security Testing (SAST) methods. The GBVDM represents a significant advancement in cybersecurity, offering a comprehensive and efficient approach to vulnerability detection. This method identifies known vulnerabilities and predicts potential future threats, providing a valuable tool for developers and security analysts in the ongoing effort to secure software systems against increasingly sophisticated cyber attacks..</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Information technology has become an integral part of our lives in today's digital world. Therefore, it is crucial to ensure the security of software and the reliability of computer systems. The IT sector plays a significant role, not only in our daily lives but also in the functioning of critical infrastructure. As a result, data protection has become an essential issue. With the advancement of computer technology, cyber attackers have also become more sophisticated. This has led to researchers and developers exploring new methods of combating cyber threats.</p><p>The topic of detecting vulnerabilities in software is becoming increasingly important due to the rapid development of cyber threats. The need for both reactive actions to neutralize cyber-attacks and preventive measures to prevent them is crucial. Therefore, it's essential to develop comprehensive methods that combine different approaches and technologies to ensure maximum protection efficiency. Research in this area can contribute greatly to the development of the industry, identifying new niches for the application of advanced technologies. For example, developing specialized tools to detect vulnerabilities in specific types of software or when using specific technologies can provide valuable solutions for protecting mission-critical systems.</p><p>The work aims to create a new method of detecting vulnerabilities, which will be more effective in detecting vulnerabilities in large software against the background of existing solutions.</p><p>The discovery of software vulnerabilities has a long history, dating back to the early days of computer systems. As protecting information has always been paramount, discovering these vulnerabilities initially relied on manual code analysis and security audits. However, these methods were time-consuming and required a deep understanding of the program's internal logic. Over time, it became clear that automated methods were necessary to protect against a wide range of threats. Current researchers, such as that of Valdés-Rodríguez et al., focus on integrating security practices into agile software development <ref type="bibr" target="#b0">[1]</ref>. This emphasizes the importance of adapting to changing security requirements and developing a methodology that allows even inexperienced developers to create more secure applications. This approach signifies a change in emphasis from conventional techniques to more adaptable and flexible strategies as a part of the speedy advancement of technology and software. This is an essential step in guaranteeing reliability and security in the current digital world.</p><p>In the field of cyber security, identifying vulnerabilities in software is a key aspect of protecting information systems from growing cyber threats. Current research in this area opens up new opportunities for improving methods of analysis and identification of potential weak points.</p><p>Vulnerability refers to weak points in protection systems that can be exploited by threats due to mistakes, or imperfections in procedures, implementations, or projects. In simpler terms, vulnerabilities are any factors that make it possible for threats to succeed. Research shows that vulnerability is the primary cause of attacks. Threats are visible risks that can cause damage to a system. Vulnerable systems can be targeted by threats. Weaknesses in protection can be exploited by one or more threats, leading to unwanted incidents and unstable functioning of information system components.</p><p>The following types of activity risks are typical for innovative enterprises, which include companies in the IT sector:</p><p>• organizational (low qualification of project developers, delay in implementation of stages of its implementation); • scientific and technical (wear and tear of technological equipment, lack of capacity reserves or typical design solutions); • financial and economic (marketing, project financing risk, inflation, interest, tax and operational risks).</p><p>Weak points in information system protection can result from a variety of factors, ranging from employee negligence to malicious intruder actions. If a breach of information security occurs, the system will need to be restored, resulting in significant costs.</p><p>The presence of risk is the probability that certain undesirable events will occur, which can negatively affect the achievement of the goals of a particular business process. In particular, the functioning of the enterprise in the IT sector is related to innovative processes, development, and production of new products, works, and services. Innovative activity, striving for a competitive advantage forces the company to implement the latest achievements of science, new products, and technology, and a new system of labor and production management to maintain leading market positions, which is combined with numerous risks, the impact of which on the company's economic results is quite significant. In this regard, the timely, prompt, and correct assessment of the risks of a decrease or complete loss of information security is an urgent problem in the activities of any organization today. Information security, determining the level of security of the business environment, becomes an important aspect of general economic security in the activities of a modern company.</p><p>Today, when the number and complexity of cyberattacks are constantly growing, the issue of software security is becoming especially relevant. Malware capable of circumventing traditional defense mechanisms through the use of obfuscation and metamorphism <ref type="bibr" target="#b1">[2]</ref> causes significant financial losses to companies and individual users. According to well-known antivirus companies, such as McAfee and ESET, worldwide losses from cybercrime are estimated at hundreds of billions of dollars annually, highlighting the critical need to develop and implement more effective protection methods and early detection of vulnerabilities. For example, a 2020 McAfee report indicates that cybercrime losses have reached about $1 trillion, which is about 1% of global GDP <ref type="bibr" target="#b2">[3]</ref>.</p><p>Various reasons can lead to vulnerabilities in software and digital services, including design errors, software flaws, weak passwords, incorrect configurations, and security attacks. It is crucial to identify these vulnerabilities to ensure the security of information systems. There are different categories of vulnerabilities that can be classified based on the type of modern information systems. Let's discuss these vulnerabilities in greater detail. For our method, we have identified only a few target vulnerabilities that we aim to detect:</p><p>1. SQL injection is a vulnerability that allows attackers to insert or "inject" arbitrary SQL code into a query executed by the database <ref type="bibr" target="#b3">[4]</ref>. This can lead to unauthorized access to data, its deletion, modification, or execution of operations for which the attacker does not have permission. Common attacks: Obtaining a list of users or extracting data from other tables using login form injection and Deleting tables or databases by injecting malicious commands into text fields of web forms. Today, the methods of combating them are:</p><p>• Using parameterized queries (also known as prepared expressions), which effectively separates the SQL code from the input data, preventing it from being interpreted as part of an SQL command. • Input data sanitization: Validating and sanitizing input data to remove or escape potentially harmful characters. • Using ORM (Object-Relational Mapping) libraries: These libraries often automatically apply parameterized queries and other secure data access practices. 2. Cross-Site Scripting (XSS) is a vulnerability that occurs when an attacker can inject a malicious script into a web page, which is then executed by other users. This can happen if a web application accepts input (for example, through URL parameters, forms, or cookies) and displays it improperly on the page without escaping or sanitizing it. XSS can be used to steal cookies, and session tokens, intercept personal data, and change the appearance of a web page <ref type="bibr" target="#b4">[5]</ref>. The most common attack variant: injection through the URL parameter &lt;script&gt;alert('XSS');&lt;/script&gt;, which displays a pop-up window for each user visiting the compromised page, or injection of JavaScript code that steals the user's cookies, through comments on the forum or in reviews. The following methods are used for prevention:</p><p>• Output Escaping: Ensure that any input-output to the page is properly escaped so that it is output as plain text and not as executable code.</p><p>• Using Content Security Policy (CSP): CSP allows websites to determine from which sources scripts can be executed, which helps prevent malicious scripts from being executed. • Inbound Sanitation: Proactively inspect and sanitize inbound data to remove or block malicious code before it is processed or output. 3. Buffer overflow is a vulnerability that occurs when a program writes data to a buffer outside its limits. This can overwrite adjacent data or executable code, allowing attackers to execute malicious code <ref type="bibr" target="#b5">[6]</ref>. 4. Unsafe Deserialization -is a vulnerability that occurs when untrusted data is deserialized without proper validation or processing. This can lead to malicious code execution, application logic attacks, or data leakage <ref type="bibr" target="#b6">[7]</ref>. 5. Use of components with known vulnerabilities <ref type="bibr" target="#b7">[8]</ref>: -Many programs include thirdparty components that may contain vulnerabilities. Using such components without updating to secure versions puts the security of the entire system at risk. 6. Insecure session management is a vulnerability in session management that can allow attackers to intercept or spoof session IDs, thereby gaining access to someone else's accounts[9]. 7. Security Misconfiguration -Improper security settings can include leaving default settings, misconfiguring security headers, or weak password policies.</p><p>The study conducted by scholars Zhou, X., Verma, R.M. <ref type="bibr" target="#b8">[10]</ref> highlights the significance of quantitative analysis in managing and evaluating software system reliability. The authors suggest the application of quantitative techniques to predict the number of vulnerabilities that may be discovered in the future, based on data on vulnerabilities found in some popular operating systems. This research helps to understand how managing and detecting software vulnerabilities can be improved, leading to better protection against potential threats. This approach stresses the importance of analytical methods in vulnerability detection and prediction, which can lead to the development of more effective cybersecurity strategies. The use of quantitative analysis enables a deeper comprehension of the dynamics of vulnerability detection, as well as the development of methods to minimize risks for software systems.</p><p>The increasing complexity of the software, on the one hand, contributes to the expansion of its functionality, but on the other hand, it increases the number of potential vulnerabilities. These vulnerabilities can be used by attackers to carry out cyberattacks that threaten the security of users and organizations. Cyber-attacks can take various forms, from stealing confidential information to providing unauthorized access to systems <ref type="bibr" target="#b9">[11,</ref><ref type="bibr" target="#b10">12]</ref>. Such a situation requires careful analysis of existing protection methods and the development of new approaches capable of resisting current and potential threats.</p><p>Cybersecurity research plays a key role in the continuous development of vulnerability detection techniques. This helps identify and eliminate potential threats before they can cause harm. Innovative approaches, such as the use of machine learning, deep code analysis, and the extension of fuzzing capabilities, open new horizons for increasing the efficiency and accuracy of vulnerability detection.</p><p>Let's consider methods that can be used individually or in combination to ensure full detection of vulnerabilities in software and digital services.</p><p>Port and service scanning:</p><p>• Using tools to scan ports and identify active services on the system. This helps identify potentially vulnerable services.</p><p>Analysis of software vulnerabilities:</p><p>• Using automated tools to find vulnerabilities in software. This may include web application scanning, source code analysis, and other techniques.</p><p>Penetration testing:</p><p>• Ethical use of penetration testing to identify vulnerabilities in software. This allows security professionals to emulate attacks and identify system vulnerabilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Monitoring event logs:</head><p>• Analyze event logs and system logs to detect unusual activity or unauthorized access attempts.</p><p>Traffic analysis:</p><p>• Using tools to monitor traffic and detect anomalies, such as bounce-based attacks or large requests.</p><p>Updates and Patches:</p><p>• Systematic updating of software and application of patches to eliminate vulnerabilities that were discovered and resolved by developers.</p><p>Configuration Audit:</p><p>• Checking system and application configuration for weaknesses in settings that could create potential vulnerabilities.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Social engineering:</head><p>• Identify human-related vulnerabilities through social engineering analysis and detection of phishing opportunities.</p><p>Special attention in modern research is paid to machine learning methods, which open up new perspectives in detecting and countering cyberattacks. The prospects for the use of machine learning and artificial intelligence in the field of vulnerability detection look optimistic, offering a path to more automated, accurate, and adaptive cybersecurity systems. The development of these technologies requires a constant dialogue between researchers, practitioners, and software developers, as well as a focus on the ethical aspects of the use of artificial intelligence in vulnerability detection. Further innovations and research in this area promise not only to improve the ability to resist current and future cyber threats but also to open new horizons for the protection of the digital world <ref type="bibr" target="#b11">[13,</ref><ref type="bibr" target="#b12">14]</ref>.</p><p>According to scientist Khraisat A., detecting cyber intrusions accurately is a challenging task due to the continuous advancement of cyberattack methods <ref type="bibr" target="#b13">[15]</ref>. The author highlights the importance of adjusting intrusion detection systems to evolving threats, which involves the incorporation of advanced technologies, especially machine learning, to enhance the precision and swiftness of response to cyber-attacks. Machine learning includes the process of extracting knowledge from large data sets. It uses a set of rules, methods, or complex "transformation functions" that can be applied to discover interesting patterns in data or to recognize or predict behaviour. Techniques such as clustering, neural networks, associative rules, decision trees, genetic algorithms, and nearest-neighbour methods have been applied to analyze intrusion data. Machine learning techniques can sometimes produce a high number of false positives or have low accuracy because of difficulties in updating information about new attacks. This issue becomes even more critical when attempting to detect zero-day attacks that have no previously known signatures or behaviour patterns. Some approaches, particularly ensemble methods, may require significant computing resources and time to train on large datasets, making them unsuitable for real-time use <ref type="bibr" target="#b10">[12]</ref>. However, machine learning can help analyze large volumes of data and identify complex dependencies between program characteristics, which can ultimately lead to more effective detection of vulnerabilities <ref type="bibr" target="#b14">[16]</ref>.</p><p>However, according to studies, machine learning is not a panacea and requires further improvements, in particular in terms of adapting to new types of threats and reducing the number of false positives <ref type="bibr" target="#b15">[17]</ref>. Despite the significant potential, the application of machine learning in cyber security is accompanied by certain challenges. One of the main ones is ensuring the quality and relevance of data for model training. Incorrectly selected or outdated data can lead to detection errors, increasing the risk of missing real threats or generating false alarms. Additionally, the complexity and "black box" nature of some machine learning algorithms complicate the interpretation of results and their integration into existing security systems <ref type="bibr" target="#b10">[12,</ref><ref type="bibr" target="#b13">15]</ref>.</p><p>Automation of the vulnerability detection process has evolved with the advent of static code analysis tools that allow the identification of potential problems without the need to execute programs. These tools analyse code for known error patterns and unsafe programming practices, offering developers recommendations for their elimination <ref type="bibr" target="#b16">[18]</ref>.</p><p>Static analysis is a technique that helps to identify potential vulnerabilities in software before it is executed in a user environment. It involves analysing the code of the program to detect weaknesses and flaws that can be exploited by attackers. While static analysis is a powerful tool, it may not be able to detect all types of vulnerabilities, such as those that require code execution to be triggered, like some runtime vulnerabilities. Nonetheless, it remains an important method for improving the security and reliability of software. False positives are a common problem with static analysers. They can wrongly identify correct code as potentially vulnerable. Moreover, these analysers require a deep understanding of a program's source code and its dependencies, making them challenging for non-experts to use <ref type="bibr" target="#b10">[12]</ref>. Meanwhile, dynamic analysis is being developed as an alternative approach. Unlike static analysis, dynamic analysis requires the execution of a program in a controlled environment to detect errors that occur only during runtime <ref type="bibr" target="#b17">[19]</ref>.</p><p>One of the turning points in the detection of vulnerabilities was the introduction of fuzzing, a method that involves the generation of a large number of unpredictable input data for a program to detect processing errors. A study by scientists Huang, Y., Wang, Z., Ou, H., Chi, Y. (2022) demonstrated the high effectiveness of fuzzing in the context of mobile office software on the Android platform, using multi-method approaches to generate test cases and analyse the results <ref type="bibr" target="#b18">[20]</ref>. Fuzzing is a security detection technique that injects invalid or random data into a program and outputs behaviour that is not expected, thereby identifying program errors and potential vulnerabilities. The main idea of fuzzing is to generate data, where tests are carried out for failure of the source program, and also to choose the right tools to monitor the process. Fuzzing can generate a large number of false positives because it is not always possible to determine with certainty whether the detected program behavior is a valid vulnerability. This method requires significant resources to generate and process test cases, especially when using large-scale tests with a large amount of input data, and may not detect vulnerabilities that are activated only under very specific conditions or require complex user interaction <ref type="bibr" target="#b10">[12]</ref>. Fuzzing techniques continue to evolve, including the development of intelligent systems capable of adapting data generation strategies to improve detection performance. The proposed fuzzing-based vulnerability detection system demonstrates its viability and can provide support to developers to improve software security.</p><p>Let's review and analyse Web Application Scanners used to test web applications for vulnerabilities through penetration testing. These tools analyse a web application by generating malicious input and evaluating the application's response. However, automated web application scanners may miss vulnerabilities that require manual inspection or understanding of the context of the application's business logic. Additionally, they may generate false positive results due to insufficient understanding of the specifics of the application, which can lead to consuming resources for checking "vulnerabilities" unnecessarily. Moreover, web scanners can have limitations in evaluating complex web applications that use modern frameworks and dynamic content.</p><p>The scientific community, combining the efforts of researchers, practitioners, and developers, contributes to the creation of knowledge that can be applied to strengthen the security of information systems at all levels. This, in turn, supports sustainable growth and innovation in IT, providing robust protection against ever-evolving cyber threats.</p><p>Despite significant progress in the development of vulnerability detection methods, current approaches still face challenges that limit their effectiveness. Static analysis, for example, often leads to false positive results, which complicates the interpretation of its findings and requires further improvement to increase accuracy <ref type="bibr" target="#b10">[12]</ref>. Dynamic analysis, on the other hand, may not detect vulnerabilities that only appear under specific conditions or with certain inputs, indicating the need for more flexible and adaptive solutions.</p><p>A review of current research in the field of vulnerability detection indicates a constant search for a balance between detection efficiency, accuracy of results, and requirements for computing resources. The development of integrated approaches combining various methods and technologies, including machine learning and automated solutions, opens up new perspectives for increasing the efficiency of the processes of detection and analysis of vulnerabilities in software <ref type="bibr" target="#b19">[21,</ref><ref type="bibr" target="#b20">22]</ref>.</p><p>One of the main obstacles to the effectiveness of existing methods is their inability to quickly adapt to new and evolving vulnerabilities. Attackers are constantly improving their methods, using the latest technologies to bypass defense mechanisms. This requires detection methods to constantly update and expand knowledge bases to identify new threats. However, the updating process often lags behind the speed of development of cyber threats, which calls into question the effectiveness of these methods against the latest attacks <ref type="bibr" target="#b9">[11]</ref>.</p><p>Current methods of detecting vulnerabilities in software often face some challenges that limit their effectiveness. Static analysis, although it provides extensive code coverage, can generate a large number of false positives, which complicates the process of identifying true vulnerabilities. The problem of false-positive and false-negative results remains relevant for many detection methods. The high number of false positives in static analysis methods requires security professionals to spend a lot of effort to check each such case, which reduces their productivity and can distract from the detection of real vulnerabilities. False negatives, in turn, create an illusion of security, hiding existing vulnerabilities from analysts. On the other hand, dynamic analysis requires the program to be executed in a controlled environment, which may not reveal vulnerabilities that only manifest under certain conditions.</p><p>After considering the problems stated above, it is evident that the industry needs new and innovative approaches and methodologies to effectively adapt to the evolving landscape of cyber threats. This will ensure timely and accurate detection of vulnerabilities. Developing such methods requires a deep understanding of both the technical aspects of software and the dynamics of cyber threats, as well as the integration of cutting-edge research in machine learning, computational logic, and data analytics.</p><p>In addition, software security is a problem not only with the variety and complexity of attacks but also with the methods that attackers use to hide their actions. For example, the use of code obfuscation and metamorphism techniques makes it difficult to detect malicious programs and malicious code <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b21">23]</ref>.</p><p>Code obfuscation is the process of intentionally complicating a program's code to make it difficult to analyze, understand, and modify without changing its primary functionality. This may include replacing variable names with obscure symbols, changing the program's control flow, and other transformations that make the code less understandable <ref type="bibr" target="#b16">[18,</ref><ref type="bibr" target="#b17">19]</ref>.</p><p>Metamorphism, on the other hand, refers to a technique that allows malicious code to change its structure at each execution without changing its underlying behavior. This makes it difficult to detect by anti-virus programs, as malware signatures are constantly changing <ref type="bibr" target="#b22">[24]</ref><ref type="bibr" target="#b23">[25]</ref><ref type="bibr" target="#b24">[26]</ref>.</p><p>Existing defenses against such threats include a variety of static and dynamic analysis tools, intrusion detection systems, and antivirus programs that use heuristic analysis, behavioral analysis, and signature patterns to identify potentially malicious activities. However, the effectiveness of these tools can be limited due to the use of the mentioned concealment techniques <ref type="bibr" target="#b24">[26,</ref><ref type="bibr" target="#b25">27]</ref>.</p><p>After analyzing different software vulnerability detection methods, their advantages and disadvantages, we came up with a new method called the "Graph-based Vulnerability Detection Method". This method can be integrated with existing technologies discussed in the article and can provide a more in-depth analysis of dependencies in the program code. By doing so, it can identify potential vulnerabilities more effectively. We believe that this new method can help software developers classify and identify potential vulnerabilities, giving them a powerful tool to enhance the security of their products in the early stages of development.</p><p>The concept is to build a dynamic dependency graph for software. The vertices of the graph represent distinct elements of the program, such as functions, classes, modules, and global variables. The edges represent the connections between these elements, such as function calls, class inheritance, and module imports. By examining the graph, potential vulnerabilities can be recognized based on the manner in which the components interact with each other.</p><p>Its main application is for large software with many modules, classes, globals, and methods, which is what our method will cover. To use the method, you first need to use a static analysis tool to analyze the files to identify all of the above elements and the dependencies between them, getting the required input data.</p><p>The graph of dependencies can be represented as a directed graph G = (C, E), where C is a set of vertices representing program components, and E is a set of directed edges representing dependencies between these components.</p><p>Operations on the graph:</p><p>1. Definition of the degree of dependence (D): in-degree(|{e∈E|e=(c,k)}|) is the number of edges included in the vertex v (input dependencies). out-degree(|{e∈E|e=(c,k)}|) is the number of edges coming out of the vertex v (outgoing dependencies). c, k are vertices in the graph, representing program components. E is a set of edges that represent dependencies between components. This allows you to identify components with a high degree of dependency that may pose a higher risk. Equation <ref type="formula" target="#formula_0">1</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>𝐷(𝑐</head><p>2. Path analysis: Using depth-first search (DFS) or breadth-first search (BFS) algorithms, all possible paths between two vertices can be identified. This allows you to detect unsafe data transmission paths that can lead to vulnerabilities. 3. Risk assessment of components: The risk of a component can be assessed based on its dependencies and importance in the context of the overall functionality of the application. Equation <ref type="formula" target="#formula_1">2</ref>.</p><p>𝑅(𝑐) = 𝛼 * 𝐷(𝑐, 𝑘, 𝑒) + 𝛽 * 𝐼(𝑐)</p><p>4. Where I(v) is the importance index of the vertex (for example, based on its functional role), and α and β are coefficients that determine the weight of the degree of dependence and the importance index, respectively.</p><p>Machine learning can be integrated to efficiently analyze the dependency graph and recognize patterns that may indicate potential vulnerabilities. Historical data about vulnerabilities and their contexts in software can be used as training data to enable the system to predict security risks for new or changed application components. This approach not only detects existing vulnerabilities but also predicts potential locations of new vulnerabilities, providing comprehensive protection against software security threats.</p><p>We selected the software intended for the Windows 10 system, which comprises around 1000 components, including classes, modules, and functions, for testing purposes. During the software counting process, we identified 3,217 dependencies between the components. It has been found that the program has the potential to contain nearly 150 vulnerabilities.</p><p>To compare the results of the Static Application Security Testing (SAST) detection method with the Dynamic Analysis of the Dependency Graph, we conducted the testing, and the outcome is presented in Table <ref type="table">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>Results of experiments It can be observed that although DAGD takes more time for analysis (12 minutes more), its efficiency is higher by 19.44%. Our method also covers 3% more code, which can be critical for large and complex projects. Another significant advantage of DAGD is its ability to effectively identify complex dependencies that can lead to vulnerabilities, thus helping to better understand the application architecture and potential risks. Thus, identifying vulnerabilities in software is a critically important aspect of cyber security. The development of the latest methods and approaches to the analysis and protection of software is key to countering modern cyber threats, which in turn will contribute to the creation of a safer cyberspace. Further research in this area will not only improve existing techniques for detecting vulnerabilities but also contribute to the development of new approaches and security standards that can provide reliable protection against modern cyber threats.</p><p>Improving cyber security requires an interdisciplinary approach that involves the application of knowledge from various fields of science and technology. This approach aims to develop complex solutions in the field of software protection. It is important to have a deep understanding of technology and an awareness of the social, economic, and psychological factors that impact cyber security.</p><p>Collaboration between government institutions, the private sector, and academic circles can hasten the development and implementation of innovative methods to protect against cyber threats. This can also help establish widely recognized standards and regulations in the field of cybersecurity. By utilizing advanced technologies such as artificial intelligence, machine learning, and big data analytics, we can enhance the efficiency of our systems for detecting and neutralizing cyber threats. In this context, the proposed method we developed shows significant advantages over traditional approaches such as SAST. An experimental application of the GBVDM method on Windows 10 software with 1000 components showed that it can identify more vulnerabilities with fewer false positives and better code coverage. This confirms the importance of further development and integration of the latest analysis methods into standard cyber defense procedures to ensure more effective detection and remediation of vulnerabilities.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: SQL Injection example.</figDesc><graphic coords="4,85.05,395.45,421.30,123.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Cross-Site Scripting example.</figDesc><graphic coords="5,99.25,169.24,383.47,228.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>, 𝑘, 𝑒) = 𝑖𝑛 − 𝑑𝑒𝑔𝑟𝑒𝑒(|{𝑒 ∈ 𝐸|𝑒 = (𝑐, 𝑘)}|) + 𝑜𝑢𝑡 − 𝑑𝑒𝑔𝑟𝑒𝑒(|{𝑒 ∈ 𝐸|𝑒 = (𝑐, 𝑘)}|)</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Towards the Integration of Security Practices in Agile Software Development. A Systematic Mapping Review</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Valdés-Rodríguez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hochstetter-Diez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Díaz-Arancibia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Cadena-Martínez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Appl. Sci</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page">4578</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Metamorphic Viruses&apos; Detection Technique Based on the Equivalent Functional Block Search</title>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Savenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CEUR-WS</title>
		<imprint>
			<biblScope unit="volume">1844</biblScope>
			<biblScope unit="page" from="555" to="569" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="https://www.mcafee.com/en-gb/consumer-corporate/newsroom/press-releases/press-release.html?news_id=6859bd8c-9304-4147-bdab-32b35457e629&amp;virus_k=98318" />
		<title level="m">New McAfee Report Estimates Global Cybercrime Losses to Exceed $1 Trillion</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<ptr target="https://portswigger.net/web-security/sql-injection" />
		<title level="m">SQL injection</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<ptr target="https://portswigger.net/web-security/cross-site-scripting" />
		<title level="m">Cross-Site Scripting</title>
				<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<ptr target="https://www.techtarget.com/searchsecurity/definition/buffer-overflow" />
		<title level="m">buffer overflow</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Insecure deserialization</title>
		<ptr target="https://portswigger.net/web-security/deserialization" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<ptr target="https://prophaze.com/web-application-fireall/components-with-known-vulnerabilities/" />
		<title level="m">What Is Components With Known Vulnerabilities? How To Mitigate The Risks Associated With The Usage Of Such Components</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Software Vulnerability Detection via Multimodal Deep Learning</title>
		<author>
			<persName><forename type="first">X</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">M</forename><surname>Verma</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-29504-1_5</idno>
		<ptr target="https://doi.org/10.1007/978-3-031-29504-1_5" />
	</analytic>
	<monogr>
		<title level="m">Security and Trust Management. STM 2022</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">G</forename><surname>Lenzini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">W</forename><surname>Meng</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">13867</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Zou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Jin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Chen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Dependable and Secure Computing</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="2244" to="2258" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Evaluation of Software Vulnerability Detection Methods and Tools. A Review</title>
		<author>
			<persName><forename type="first">R</forename><surname>Amankwah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kudjo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yeboah</surname></persName>
		</author>
		<idno type="DOI">169.22-27.10.5120/ijca2017914750</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Applications</title>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Advancing Network Security: Enhancing Dynamic Vulnerability Detection in Secure and Insecure Programming through SDN-ML Hybrid Architecture</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sultan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Hendaoui</surname></persName>
		</author>
		<idno type="DOI">10.21203/rs.3.rs-3318480/v1</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title/>
		<author>
			<persName><forename type="first">Xuan</forename></persName>
		</author>
		<idno type="DOI">10.1080/23311916.2023.2221962</idno>
	</analytic>
	<monogr>
		<title level="j">Cogent Engineering</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">2221962</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Survey of intrusion detection systems: techniques, datasets and challenges</title>
		<author>
			<persName><forename type="first">A</forename><surname>Khraisat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Gonda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Vamplew</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kamruzzaman</surname></persName>
		</author>
		<idno type="DOI">10.1186/s42400-019-0038-7</idno>
	</analytic>
	<monogr>
		<title level="j">Cybersecur</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page">20</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Exploring the Effectiveness of Web Crawlers in Detecting Security Vulnerabilities in Computer Software Applications</title>
		<author>
			<persName><forename type="first">B</forename><surname>Wan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Koo</surname></persName>
		</author>
		<idno type="DOI">10.47738/ijiis.v6i2.158</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.47738/ijiis.v6i2.158" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Informatics and Information Systems</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="56" to="65" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Measuring the Cost of Software Vulnerabilities</title>
		<author>
			<persName><forename type="first">A</forename><surname>Anwar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khormali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Choi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Alasmary</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Sung</forename><forename type="middle">J</forename><surname>Choi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Salem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Nyang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mohaisen</surname></persName>
		</author>
		<idno type="DOI">10.4108/eai.13-7-2018.164551</idno>
	</analytic>
	<monogr>
		<title level="j">SESA EAI</title>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Cybersecurity: Research on methods for detection DDoS attacks</title>
		<author>
			<persName><forename type="first">M</forename><surname>Chornobuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dubrovin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Deineha</surname></persName>
		</author>
		<idno type="DOI">10.31891/csit-2023-4-1</idno>
		<ptr target="https://doi.org/10.31891/csit-2023-4-1" />
	</analytic>
	<monogr>
		<title level="j">Computer Systems and Information Technologies</title>
		<imprint>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="6" to="9" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Measuring the accuracy of software vulnerability assessments: experiments with students and professionals</title>
		<author>
			<persName><forename type="first">L</forename><surname>Allodi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Cremonini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Massacci</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Empir Software Eng</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="1063" to="1094" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Fuzzing-Based Office Software Vulnerability Mining on Android Platform</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Chi</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-981-19-2456-9_114</idno>
	</analytic>
	<monogr>
		<title level="m">Proceeding of 2021 International Conference on Wireless Communications, Networking and Applications</title>
		<title level="s">Lecture Notes in Electrical Engineering</title>
		<editor>
			<persName><forename type="first">Z</forename><surname>Qian</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Jabbar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">X</forename><surname>Li</surname></persName>
		</editor>
		<meeting>eeding of 2021 International Conference on Wireless Communications, Networking and Applications<address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Shen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chen</surname></persName>
		</author>
		<idno type="DOI">10.1155/2020/8858010</idno>
	</analytic>
	<monogr>
		<title level="j">Security and Communication Networks</title>
		<imprint>
			<biblScope unit="page">8858010</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">System security assurance. A systematic literature review</title>
		<author>
			<persName><forename type="first">A</forename><surname>Shukla</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Katt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">O</forename><surname>Nweke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">K</forename><surname>Yeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">K</forename><surname>Weldehawaryat</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Science Review</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="1574" to="0137" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Approach for the Unknown Metamorphic Virus Detection</title>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Savenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications</title>
				<meeting>the 8-th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications<address><addrLine>Bucharest (Romania</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017">September 21-23. 2017</date>
			<biblScope unit="page" from="71" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Metamorphic Viruses Detection Technique based on the the Modified Emulators</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CEUR-WS</title>
		<imprint>
			<biblScope unit="volume">1614</biblScope>
			<biblScope unit="page" from="375" to="383" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Technique for detection of bots which are using polymorphic code</title>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Savenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lysenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kryshchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Nicheporuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Communications in Computer and Information Science</title>
		<imprint>
			<biblScope unit="volume">431</biblScope>
			<biblScope unit="page" from="1865" to="0929" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities</title>
		<author>
			<persName><forename type="first">A</forename><surname>Sadeghi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Esfahani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Malek</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-642-54804-8_11</idno>
	</analytic>
	<monogr>
		<title level="m">Fundamental Approaches to Software Engineering</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">S</forename><surname>Gnesi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Rensink</surname></persName>
		</editor>
		<meeting><address><addrLine>Berlin, Heidelberg</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2014">2014</date>
			<biblScope unit="volume">8411</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Software vulnerability prediction. A systematic mapping study</title>
		<author>
			<persName><forename type="first">I</forename><surname>Kalouptsoglou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Siavvas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ampatzoglou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kehagias</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Chatzigeorgiou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information and Software Technology</title>
		<imprint>
			<biblScope unit="volume">164</biblScope>
			<biblScope unit="page" from="950" to="5849" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
