<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ilias Kalouptsoglou, Miltiadis Siavvas, Dionysios Kehagias, Centre for Research and Technology Hellas and Alexandros Chatzigeorgiou, Apostolos Ampatzoglou, University of Macedonia, Author at IoTAC</title>
	<atom:link href="https://iotac.eu/author/vilmosaagmail-com/feed/" rel="self" type="application/rss+xml" />
	<link>https://iotac.eu/author/vilmosaagmail-com/</link>
	<description>Internet of Things Access Control</description>
	<lastBuildDate>Mon, 21 Aug 2023 18:48:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.2.9</generator>

<image>
	<url>https://iotac.eu/wp-content/uploads/2020/11/cropped-favicon-32x32.jpg</url>
	<title>Ilias Kalouptsoglou, Miltiadis Siavvas, Dionysios Kehagias, Centre for Research and Technology Hellas and Alexandros Chatzigeorgiou, Apostolos Ampatzoglou, University of Macedonia, Author at IoTAC</title>
	<link>https://iotac.eu/author/vilmosaagmail-com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A,  2023. Software vulnerability prediction: A systematic mapping study. Information and Software Technology, Vol. 164, 2023.</title>
		<link>https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/</link>
					<comments>https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/#respond</comments>
		
		<dc:creator><![CDATA[Ilias Kalouptsoglou, Miltiadis Siavvas, Dionysios Kehagias, Centre for Research and Technology Hellas and Alexandros Chatzigeorgiou, Apostolos Ampatzoglou, University of Macedonia]]></dc:creator>
		<pubDate>Mon, 21 Aug 2023 18:48:29 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=12743</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/">Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A,  2023. Software vulnerability prediction: A systematic mapping study. Information and Software Technology, Vol. 164, 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4b9d7ac9"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row top-level standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style=""  href="https://drive.google.com/uc?export=download&#038;id=1ZWN9fu-zUOazP1XeSY3TvTwlSy6WSQG0" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>Information and Software Technology, Vol. 164, 2023.</p>
<p><strong>Authors:<br />
</strong>Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A.</p>
<p><strong>Abstract:<br />
Context:</strong> Software security is considered a major aspect of software quality as the number of discovered vulnerabilities in software products is growing. Vulnerability prediction is a mechanism that helps engineers to prioritize their inspection efforts focusing on vulnerable parts. Despite the recent advancements, current literature lacks a systematic mapping study on vulnerability prediction.<br />
<strong>Objective:</strong> This paper aims to analyze the state-of-the-art of vulnerability  prediction focusing on: (a) the goals of vulnerability prediction-related studies; (b) the data collection processes and the types of datasets that exist in the literature; (c) the mostly examined techniques for the construction of the prediction models and their input features; and (d) the utilized evaluation techniques.<br />
<strong>Method:</strong> We collected 180 primary studies following a broad search methodology across four popular digital libraries. We mapped these studies to the variables of interest and we identified trends and relationships between the studies.<br />
<strong>Results:</strong> The main findings suggest that: (i) there are two major study types, prediction of vulnerable software components and forecasting of the evolution of vulnerabilities in software; (ii) most studies construct their own vulnerability-related dataset retrieving information from vulnerability databases for real-world software; (iii) there is a growing interest for deep learning models along with a trend on textual source code representation; and (iv) F1-score was found to be the most widely used evaluation metric.<br />
<strong>Conclusions:</strong> The results of our study indicate that there are several open challenges in the domain of vulnerability prediction. One of the major conclusions, is the fact that most studies focus on within-project prediction, neglecting the real-world scenario of cross-project prediction.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/">Kalouptsoglou I, Siavvas M, Ampatzoglou A, Kehagias D, Chatzigeorgiou A,  2023. Software vulnerability prediction: A systematic mapping study. Information and Software Technology, Vol. 164, 2023.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/kalouptsoglou-i-siavvas-m-ampatzoglou-a-kehagias-d-chatzigeorgiou-a-2023-software-vulnerability-prediction-a-systematic-mapping-study-information-and-software-technology-vol-164-2023/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2022. Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction. Entropy. 2022, 24, 651.</title>
		<link>https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2022-examining-the-capacity-of-text-mining-and-software-metrics-in-vulnerability-prediction-entropy-2022-24-651/</link>
					<comments>https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2022-examining-the-capacity-of-text-mining-and-software-metrics-in-vulnerability-prediction-entropy-2022-24-651/#respond</comments>
		
		<dc:creator><![CDATA[Ilias Kalouptsoglou, Miltiadis Siavvas, Dionysios Kehagias, Centre for Research and Technology Hellas and Alexandros Chatzigeorgiou, Apostolos Ampatzoglou, University of Macedonia]]></dc:creator>
		<pubDate>Fri, 20 May 2022 05:59:12 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=9633</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2022-examining-the-capacity-of-text-mining-and-software-metrics-in-vulnerability-prediction-entropy-2022-24-651/">Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2022. Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction. Entropy. 2022, 24, 651.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4b9d8521"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=1PYZB5FrW4kpX9hdNR9GLQ3nP06cBfIgB" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Journal:<br />
</strong>Entropy 2022, 24, 651.</p>
<p><strong>Authors:<br />
</strong>Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A.</p>
<p><strong>Abstract:<br />
</strong>Software security is a very important aspect for software development organizations who wish to provide high-quality and dependable software to their consumers. A crucial part of software security is the early detection of software vulnerabilities. Vulnerability prediction is a mechanism that facilitates the identification (and, in turn, the mitigation) of vulnerabilities early enough during the software development cycle. The scientific community has recently focused a lot of attention on developing Deep Learning models using text mining techniques for predicting the existence of vulnerabilities in software components. However, there are also studies that examine whether the utilization of statically extracted software metrics can lead to adequate Vulnerability Prediction Models. In this paper, both software metrics- and text mining-based Vulnerability Prediction Models are constructed and compared. A combination of software metrics and text tokens using deeplearning models is examined as well in order to investigate if a combined model can lead to more accurate vulnerability prediction. For the purposes of the present study, a vulnerability dataset containing vulnerabilities from real-world software products is utilized and extended. The results of our analysis indicate that text mining-based models outperform software metrics-based models with respect to their F2-score, whereas enriching the text mining-based models with software metrics was not found to provide any added value to their predictive performance.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2022-examining-the-capacity-of-text-mining-and-software-metrics-in-vulnerability-prediction-entropy-2022-24-651/">Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2022. Examining the Capacity of Text Mining and Software Metrics in Vulnerability Prediction. Entropy. 2022, 24, 651.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2022-examining-the-capacity-of-text-mining-and-software-metrics-in-vulnerability-prediction-entropy-2022-24-651/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2021. An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction. EuroCybersec2021.</title>
		<link>https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2021-an-empirical-evaluation-of-the-usefulness-of-word-embedding-techniques-in-deep-learning-based-vulnerability-prediction-e/</link>
					<comments>https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2021-an-empirical-evaluation-of-the-usefulness-of-word-embedding-techniques-in-deep-learning-based-vulnerability-prediction-e/#respond</comments>
		
		<dc:creator><![CDATA[Ilias Kalouptsoglou, Miltiadis Siavvas, Dionysios Kehagias, Centre for Research and Technology Hellas and Alexandros Chatzigeorgiou, Apostolos Ampatzoglou, University of Macedonia]]></dc:creator>
		<pubDate>Fri, 29 Oct 2021 10:59:39 +0000</pubDate>
				<category><![CDATA[Publications]]></category>
		<guid isPermaLink="false">https://iotac.eu/?p=9203</guid>

					<description><![CDATA[<p>The post <a href="https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2021-an-empirical-evaluation-of-the-usefulness-of-word-embedding-techniques-in-deep-learning-based-vulnerability-prediction-e/">Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2021. An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction. EuroCybersec2021.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></description>
										<content:encoded><![CDATA[
		<div id="fws_69e5f4b9d8bee"  data-column-margin="default" data-midnight="dark"  class="wpb_row vc_row-fluid vc_row standard_section "  style="padding-top: 0px; padding-bottom: 0px; "><div class="row-bg-wrap" data-bg-animation="none" data-bg-overlay="false"><div class="inner-wrap"><div class="row-bg"  style=""></div></div><div class="row-bg-overlay" ></div></div><div class="row_col_wrap_12 col span_12 dark left">
	<div  class="vc_col-sm-12 wpb_column column_container vc_column_container col no-extra-padding inherit_tablet inherit_phone "  data-t-w-inherits="default" data-bg-cover="" data-padding-pos="all" data-has-bg-color="false" data-bg-color="" data-bg-opacity="1" data-hover-bg="" data-hover-bg-opacity="1" data-animation="" data-delay="0" >
		<div class="vc_column-inner" ><div class="column-bg-overlay-wrap" data-bg-animation="none"><div class="column-bg-overlay"></div></div>
			<div class="wpb_wrapper">
				<a class="nectar-button large regular accent-color  wpb_animate_when_almost_visible wpb_fadeInDown fadeInDown regular-button"  style="" target="_blank" href="https://drive.google.com/uc?export=download&#038;id=18QjmkjVNwX8vhvak0XQ8aP0nIxgr4lrE" data-color-override="false" data-hover-color-override="false" data-hover-text-color-override="#fff"><span>Download</span></a>
<div class="wpb_text_column wpb_content_element " >
	<div class="wpb_wrapper">
		<p><strong>Conference:<br />
</strong>EuroCybersec2021 Workshop</p>
<p><strong>Authors:<br />
</strong>Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A.</p>
<p><strong>Abstract:<br />
</strong></p>
<p>Software security is a critical consideration for software development companies that want to provide their customers with high quality and dependable software. The automated detection of software vulnerabilities is a critical aspect in software security. Vulnerability prediction is a mechanism that enables the detection and mitigation of software vulnerabilities early enough in the development cycle. Recently the scientific community has dedicated a lot of effort on the design of Deep learning models based on text mining techniques. Initially, Bag-of-Words was the most promising method but recently more complex models have been proposed focusing on the sequences of instructions in the source code. Recent research endeavours have started utilizing word embedding vectors, which are widely used in text classification tasks like semantic analysis, for representing the words (i.e., code instructions) in vector format. These vectors could be trained either jointly with the other layers of the neural network, or they can be pre-trained using popular algorithms like word2vec and fast-text. In this paper, we empirically examine whether the utilization of word embedding vectors that are pre-trained separately from the vulnerability predictor could lead to more accurate vulnerability prediction models. For the purposes of the present study, a popular vulnerability dataset maintained by NIST was utilized. The results of the analysis suggest that pre-training the embedding vectors separately from the neural network leads to better vulnerability predictors with respect to their effectiveness and performance.</p>
	</div>
</div>




			</div> 
		</div>
	</div> 
</div></div>
<p>The post <a href="https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2021-an-empirical-evaluation-of-the-usefulness-of-word-embedding-techniques-in-deep-learning-based-vulnerability-prediction-e/">Kalouptsoglou I, Siavvas M, Kehagias D, Chatzigeorgiou A, Ampatzoglou A. 2021. An Empirical Evaluation of the Usefulness of Word Embedding Techniques in Deep Learning-based Vulnerability Prediction. EuroCybersec2021.</a> appeared first on <a href="https://iotac.eu">IoTAC</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://iotac.eu/kalouptsoglou-i-siavvas-m-kehagias-d-chatzigeorgiou-a-ampatzoglou-a-2021-an-empirical-evaluation-of-the-usefulness-of-word-embedding-techniques-in-deep-learning-based-vulnerability-prediction-e/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
