Popularity and marketshare are very important index for software users and vendors since more popular systems tend to engage better user experience and environments. periodical fluctuations in the popularity and marketshare could be vital factors when we estimate the potential risk analysis in target systems. Meanwhile, software vulnerabilities, in major relational database management systems, are detected every now and then. Today, all most every organizations depend on those database systems for store and retrieve their any kinds of informations for the reasons of security, effectiveness, etc. They have to manage and evaluate the level of risks created by the software vulnerabilities so that they could avoid potential losses before the security defects damage their reputations. Here, we examine the seasonal fluctuations with respect to the view of software security risks in the four major database systems, namely MySQL, MariaDB, Oracle Database and Microsoft SQL Server.
Pfleeger, C. P. & Pfleeger, S. L. (2003). Security in computing (3rd ed.). Prentice Hall PTR
Allodi, L. (2008, May). Economic Factors of Vulnerability Trade and Exploitation. in proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, TX, USA, 1483–1499.
Scarfone, K. & Mell, P. (2009). An Analysis of CVSS Version 2 Vulnerability Scoring. in proceedings of the 2009 International Symposium on Empirical Software Engineering and Measurement, 516–525.
Wai, F. K., Yong, L. W., Divakaran D. M. & Thing, V. L. L. (2018). Predicting vulnerability discovery rate using past versions of a software. in proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics, Singapore, 220–225.
Joh, H. (2015). Assessing Web Browser Security Vulnerabilities with respect to CVSS. Journal of Korea Multimedia Society, 18(2), 199–206.  Alhazmi, O.H. & Malaiya, Y.K. (2008). Application of Vulnerability Discovery Models to Major Operating Systems. IEEE Transactions on Reliability, 57(1), 14–22.
Joh,H.&Malaiya,Y.K.(2017).Periodicityinsoftwarevulnerabilitydiscovery, patching and exploitation. International Journal of Information Security, Vol.16, pp.673-–690.
Heston, S. L. & Sadka, R. (2008) Seasonality in the cross-section of stock returns. Journal of Financial Economics, Vol.87 No.2, pp.418—445.
Carrion-Baralt, J. R., Smith, C. J., Rossy-Fullana, E., Lewis- Femandez, R., Davis, K. L. & Silverman, J.M. (2006) Seasonality effects on schizophrenic births in multiplex families in a tropical island. Psychiatry Research, Vol.142 No.1, pp.93—97.
Arsham, H (1994-2015) Time-Critical Decision Making for Business Administration. Accessed on 2020.12.04: http://home.ubalt.edu/ ntsbarsh/business- stat/stat- data/forecast.htm
Americanassembly.org (2011). Adobe Logic. Retrived from https:// piracy.americanassembly.org/adobe- logic/
Mondok,m.(2007).Microsoftexecutive:Piratingsoftware?ChooseMi- crosoft!. Retrived from http://arstechnica.com/microsoft/news/2007/ 03/microsoft- executive- pirating- software- choose- microsoft.ars
Qualys, I.: The laws of vulnerabilities 2.0. In Black Hat 2009, Presented by Wolfgang Kandek (CTO) (July 28, 2009)
This work is licensed under a Creative Commons Attribution 4.0 International License.
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.
Submission of the manuscript represents that the manuscript has not been published previously and is not considered for publication elsewhere.