Follow
Awad A Younis Mussa
Awad A Younis Mussa
Assistant Professor of Computer Science, Northern Kentucky University.
Verified email at nku.edu
Title
Cited by
Cited by
Year
Assessing vulnerability exploitability risk using software properties
A Younis, YK Malaiya, I Ray
Software Quality Journal, 1-44, 2015
802015
Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability
AA Younis, YK Malaiya, I Ray
2014 IEEE 15th International Symposium on High-Assurance Systems Engineering …, 2014
692014
To fear or not to fear that is the question: Code characteristics of a vulnerable functionwith an existing exploit
A Younis, Y Malaiya, C Anderson, I Ray
Proceedings of the sixth ACM conference on data and application security and …, 2016
682016
Developing parallel programming and soft skills: A project based learning approach
AA Younis, R Sunderraman, M Metzler, AG Bourgeois
Journal of Parallel and Distributed Computing 158, 151-163, 2021
462021
Comparing and evaluating CVSS base metrics and microsoft rating system
AA Younis, YK Malaiya
2015 IEEE International Conference on Software Quality, Reliability and …, 2015
392015
Modeling learningless vulnerability discovery using a folded distribution
A Younis, HC Joh, Y Malaiya
Proc. of SAM 11, 617-623, 2011
382011
Using software structure to predict vulnerability exploitation potential
AA Younis, YK Malaiya
2014 IEEE Eighth International Conference on Software Security and …, 2014
282014
A threat analysis methodology for security requirements elicitation in machine learning based systems
C Wilhjelm, AA Younis
2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020
242020
Evaluating CVSS base score using vulnerability rewards programs
A Younis, YK Malaiya, I Ray
ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International …, 2016
192016
Relationship between Attack Surface and Vulnerability Density: A Case Study on Apache HTTP Server
AA Younis, YK Malaiya
The 2012 International Conference on Internet Computing, pp. 197-203, 2012
182012
Case Study: Using Project Based Learning to Develop Parallel Programing and Soft Skills
A Younis, R Sunderraman, M Metzler, A Bourgeois
IEEE International Parallel and Distributed Processing Symposium Workshops …, 2019
172019
Mapping Zero-Click Attack Behavior into MITRE ATT&CK Mobile: A Systematic Process
AA Younis, Z Daher, B Martin, C Morgan
2022 International Conference on Computational Science and Computational …, 2022
22022
User’s Susceptibility Factors to Malware Attacks: A Systemic Literature Review
AA Younis, E Stronberg, S Noor
International Journal of Computer and Information Engineering 15 (9), 543-554, 2021
12021
Empirical characterization of the likelihood of vulnerability discovery
C Wilhjelm, T Kotadiya, AA Younis
International Journal of Performability Engineering 16 (7), 1008, 2020
12020
Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach
AA Younis, Y Hu, R Abdunabi
2023 10th International Conference on Dependable Systems and Their …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–15