Neuro-Fuzzy Based Software Risk Estimation Tool

Pooja Rani
Pooja Rani
Dalwinder Singh Salaria
Dalwinder Singh Salaria
Lovely Professional University Lovely Professional University

Send Message

To: Author

Neuro-Fuzzy Based Software Risk Estimation Tool

Article Fingerprint

ReserarchID

CSTSDE1SL31

Neuro-Fuzzy Based Software Risk Estimation Tool Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu
Font Type
Font Size
Font Size
Bedground

Abstract

To develop the secure software is one of the major concerns in the software industry. To make the easier task of finding and fixing the security flaws, software developers should integrate the security at all stages of Software Development Life Cycle (SDLC).In this paper, based on Neuro-Fuzzy approach software Risk Prediction tool is created. Firstly Fuzzy Inference system is created and then Neural Network based three different training algorithms: BR (Bayesian Regulation), BP (Back propagation) and LM (Levenberg-Marquardt) are used to train the neural network. From the results it is conclude that for the Software Risk Estimation, BR (Bayesian Regulation) performs better and also achieves the greater accuracy than other algorithms.

References

24 Cites in Article
  1. T Lee,S Jung,H In,H Lee (2007). Cyber Threat Trend Analysis Model Using HMM.
  2. Frank Greitzer,Andrew Moore,Dawn Cappelli,Dee Andrews,Lynn Carroll,Thomas Hull (2008). Combating the Insider Cyber Threat.
  3. Jeffrey Ingalsbe,Tim Louis Kunimatsu,Nancy Baeten,Mead (2008). Threat modeling: diving into the deep end.
  4. P Ongsakorn,K Turney,M Thornton,S Nair,S Szygenda,T Manikas (2010). Cyber threat trees for large system threat cataloging and analysis.
  5. Michael Gegick,Laurie Williams (2005). Matching attack patterns to security vulnerabilities in softwareintensive system designs.
  6. Vandana Gandotra,Archana Singhal,Punam Bedi (2009). Threat Mitigation, Monitoring and Management Plan - A New Approach in Risk Management.
  7. Xucheng Tang,Beijun Shen (2009). Extending Model Driven Architecture with Software Security Assessment.
  8. Danny Dhillon (2011). Developer-Driven Threat Modeling: Lessons Learned in the Trenches.
  9. T Okubo,H Kaiya,N Yoshioka (2011). Effective security impact analysis with patterns for software enhancement.
  10. Antonietta Stango,Neeli Prasad,Dimitris Kyriazanos (2009). A Threat Analysis Methodology for Security Evaluation and Enhancement Planning.
  11. T Frantz,K Carley (2009). Information assurances and threat identification in networked organizations.
  12. H Debar,M Becker,D Siboni (1992). A neural network component for an intrusion detection system.
  13. S Mukkamala,G Janoski,A Sung (2002). Intrusion detection using neural networks and support vector machines.
  14. R Gong,M Zulkernine,P Abolmaesumi (2005). A software implementation of a genetic algorithm based approach to network intrusion detection.
  15. K Haslum,A Abraham,S Knapskog (2008). Hinfra: Hierarchical neuro-fuzzy learning for online risk assessment.
  16. E Ngai,F Wat (2005). Fuzzy decision support system for risk analysis in e-commerce development.
  17. Vandana Gandotra,Archana Singhal,Punam Bedi (2010). A step towards Secure Software System using fuzzy logic.
  18. Shuliang Li (2000). The development of a hybrid intelligent system for developing marketing strategy.
  19. C Shieh,C Lin (2000). Direction of arrival estimation based on phase differences using neural fuzzy network.
  20. J Wong,D Ho,L Capretz (2008). Calibrating function point backfiring conversion ratios using neuro-fuzzy technique.
  21. Kjetil Haslum,Ajith Abraham,Svein Knapskog (2008). HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment.
  22. B Boehm (1991). Software risk management: principles and practices.
  23. Y Hu,X Zhang,X Sun,J Zhang,J Du,J Zhao (2010). A unified intelligent model for software project risk analysis and planning.
  24. T Bragina,G Tabunshchyk (2011). 11th International Conference on Experience of Designing and Application of CAD Systems in Microelectronics (CADSM-2011) Met in February [Chapters].

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Pooja Rani. 2013. \u201cNeuro-Fuzzy Based Software Risk Estimation Tool\u201d. Global Journal of Computer Science and Technology - C: Software & Data Engineering GJCST-C Volume 13 (GJCST Volume 13 Issue C6).

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Version of record

v1.2

Issue date
June 4, 2013

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 9777
Total Downloads: 2505
2026 Trends
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Neuro-Fuzzy Based Software Risk Estimation Tool

Pooja Rani
Pooja Rani
Dalwinder Singh Salaria
Dalwinder Singh Salaria

Research Journals