{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:41:06Z","timestamp":1763343666955,"version":"3.45.0"},"reference-count":37,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063361","type":"journal-article","created":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T05:18:58Z","timestamp":1748236738000},"page":"1529-1544","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Phase Modeling for Vulnerability Detection &amp; Patch Management: An Analysis Using Numerical Methods"],"prefix":"10.32604","volume":"84","author":[{"given":"Adarsh","family":"Anand","sequence":"first","affiliation":[]},{"given":"Deepti","family":"Aggrawal","sequence":"additional","affiliation":[]},{"given":"Omar H.","family":"Alhazmi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MSECP.2004.1281254","article-title":"Software security","volume":"2","author":"McGraw","year":"2004","journal-title":"IEEE Secur Priv"},{"key":"ref2","series-title":"Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","article-title":"How effective are neural networks for fixing security vulnerabilities","author":"Wu","year":"2023 Jul 18\u201320"},{"key":"ref3","first-page":"3263","article-title":"Software vulnerability mining and analysis based on deep learning","volume":"80","author":"Zhao","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref4","first-page":"19","author":"Anand","year":"2018","journal-title":"System reliability management"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MS.2018.290110854","article-title":"Engineering security vulnerability prevention, detection, and response","volume":"35","author":"Williams","year":"2018","journal-title":"IEEE Softw"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MSP.2005.17","article-title":"Is finding security holes a good idea?","volume":"3","author":"Rescorla","year":"2005","journal-title":"IEEE Secur Priv"},{"key":"ref7","series-title":"Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering","article-title":"Modeling the vulnerability discovery process","author":"Alhazmi","year":"2005 Nov 8\u201311"},{"key":"ref8","series-title":"Proceedings of the QoP\u201907: Proceedings of the 2007 ACM Workshop on Quality of protection","article-title":"Improving vulnerability discovery models","author":"Ozment","year":"2007 Oct 29"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TSE.2014.2354037","article-title":"An empirical methodology to evaluate vulnerability discovery models","volume":"40","author":"Massacci","year":"2014","journal-title":"IEEE Trans Softw Eng"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1109\/TSE.2022.3171202","article-title":"Data preparation for software vulnerability prediction: a systematic literature review","volume":"49","author":"Croft","year":"2022","journal-title":"IEEE Trans Softw Eng"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"101596","DOI":"10.1016\/j.cose.2019.101596","article-title":"Vulnerability prediction capability: a comparison between vulnerability discovery models and neural network models","volume":"87","author":"Movahedi","year":"2019","journal-title":"Comput Secur"},{"key":"ref12","series-title":"Proceedings of the 2012 Fourth International Conference on Multimedia Information Networking and Security","article-title":"Software vulnerability discovery techniques: a survey","author":"Liu","year":"2012 Nov 2\u20134"},{"key":"ref13","series-title":"Proceedings of the 2015 IEEE Symposium on Security and Privacy","article-title":"The attack of the clones: a study of the impact of shared code on vulnerability patching","author":"Nappa","year":"2015 May 17\u201321"},{"key":"ref14","series-title":"Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium","article-title":"Vulnerability discovery in multi-version software systems","author":"Kim","year":"2007 Nov 14\u201316"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"19","DOI":"10.4018\/IJSSE.2016100102","article-title":"Vulnerability discovery modeling for open and closed source software","volume":"7","author":"Sharma","year":"2016","journal-title":"Int J Secur Softw Eng"},{"key":"ref16","first-page":"288","article-title":"Modeling and characterizing software vulnerabilities","volume":"2","author":"Bhatt","year":"2017","journal-title":"Int J Math Eng Manag Sci"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.infsof.2018.06.005","article-title":"A case study on software vulnerability coordination","volume":"103","author":"Ruohonen","year":"2018","journal-title":"Inf Softw Technol"},{"key":"ref18","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","article-title":"A large-scale empirical study of security patches","author":"Li","year":"2017 Oct 30\u2013Nov 3"},{"key":"ref19","series-title":"Proceedings of the 2022 15th International Conference on Security of Information and Networks (SIN)","article-title":"Challenges on prioritizing software patching","author":"Costa","year":"2022 Nov 11\u201313"},{"key":"ref20","series-title":"Proceedings of the Advanced Informatics for Computing Research: Second International Conference, ICAICR 2018","article-title":"Modeling vulnerability discovery and patching with fixing lag","author":"Shrivastava","year":"2018 Jul 14\u201315"},{"key":"ref21","first-page":"81","author":"Almukaynizi","year":"2018","journal-title":"AI in cybersecurity"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/B978-0-12-815906-4.00011-7","author":"Anand","year":"2019","journal-title":"Advances in system reliability engineering"},{"key":"ref23","series-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering","article-title":"Patching as translation: the data and the metaphor","author":"Ding","year":"2020 Dec 21\u201325"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1640013","DOI":"10.1142\/S0218539316400131","article-title":"Vulnerability patch modeling","volume":"23","author":"Kansal","year":"2016","journal-title":"Int J Reliab Qual Saf Eng"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"5279","DOI":"10.1109\/TSE.2023.3332732","article-title":"PatchDiscovery: patch presence test for identifying binary vulnerabilities based on key basic blocks","volume":"49","author":"Xu","year":"2023","journal-title":"IEEE Trans Softw Eng"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1201\/9780429488009-15","author":"Shrivastava","year":"2019","journal-title":"Reliability engineering"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"106771","DOI":"10.1016\/j.infsof.2021.106771","article-title":"Software security patch management systematic literature review of challenges, approaches, tools and practices","volume":"144","author":"Dissanayake","year":"2022","journal-title":"Inf Softw Technol"},{"key":"ref28","series-title":"Proceedings of the 2020 IEEE Conference on Communications and Network Security (CNS)","article-title":"A machine learning approach to classify security patches into vulnerability types","author":"Wang","year":"2020 Jun 29\u2013Jul 01"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"2450031","DOI":"10.1142\/S0218539324500311","article-title":"Assessing the impact of software patching on vulnerabilities: a comprehensive framework for faulty and safe patches","volume":"32","author":"Divya","year":"2024","journal-title":"Int J Reliab Qual Saf Eng"},{"key":"ref30","series-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","article-title":"Tracking patches for open source software vulnerabilities","author":"Xu","year":"2022 Nov 14\u201318"},{"key":"ref31","first-page":"3613","article-title":"Selecting best software vulnerability scanner using intuitionistic fuzzy set TOPSIS","volume":"72","author":"Bhatt","year":"2022","journal-title":"Comput Mater Contin"},{"key":"ref32","first-page":"592","author":"Dahlquist","year":"2012","journal-title":"Numerical methods"},{"key":"ref33","first-page":"375","author":"Dennis","year":"1996","journal-title":"Numerical methods for unconstrained optimization and nonlinear equations"},{"key":"ref34","first-page":"720","author":"Rice","year":"2014","journal-title":"Numerical methods in software and analysis"},{"key":"ref35","first-page":"544","author":"Butcher","year":"2016","journal-title":"Numerical methods for ordinary differential equations"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/0168-9274(95)00108-5","article-title":"A history of Runge-Kutta methods","volume":"20","author":"Butcher","year":"1996","journal-title":"Appl Numer Math"},{"key":"ref37","first-page":"221","article-title":"Optimal software release policies for models incorporating learning in testing","volume":"9","author":"Xia","year":"1992","journal-title":"Asia-Pac J Oper Res"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_63361\/TSP_CMC_63361.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:37:24Z","timestamp":1763343444000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61737"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063361","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}