XVRS: Extended Vulnerability Risk Scoring based on Threat Intelligence

E Seker, W Meng - 2023 IEEE International Conference on …, 2023 - ieeexplore.ieee.org
Vulnerability scoring is a powerful tool for managing vulnerabilities and the associated risk. It
is used to uncover and assess security vulnerabilities in various systems, networks, and …

CVEjoin: An Information Security Vulnerability and Threat Intelligence Dataset

FRP da Ponte, EB Rodrigues, CLC Mattos - International Conference on …, 2023 - Springer
The risk of exploiting information security vulnerabilities should not be determined solely by
a single metric, such as the Common Vulnerability Scoring System (CVSS). This approach …

A Hybrid Threat Assessment Model for Security of Cyber Physical Systems

ZA Sheikh, Y Singh - 2022 Seventh International Conference …, 2022 - ieeexplore.ieee.org
The scope of Cyber Physical Systems (CPS) is extending from being utilized in ordinary
applications to critical infrastructures like smart grids, smart transportation, etc. These …

Predictive vulnerability scoring in the context of insufficient information availability

H Ghani, J Luna, A Khelil, N Alkadri… - … Conference on Risks …, 2013 - ieeexplore.ieee.org
Multiple databases and repositories exist for collecting known vulnerabilities for different
systems and on different levels. However, it is not unusual that extensive time elapses, in …

Vulnerability Threat Intelligence

C Hughes, N Robinson - 2024 - ieeexplore.ieee.org
Threat intelligence is a domain within cybersecurity where teams leverage open source
information to determine and prioritize threats to an organization. While commonly a …

An analysis of vulnerability trends, 2008-2016

DR Kuhn, MS Raunak, R Kacker - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Computer security has been a subject of serious study for at least 40 years, and a steady
stream of innovations has improved our ability to protect networks and applications. But …

Identifying patterns in common vulnerabilities and exposures databases with exploratory data analysis

A Kumar, I Sharma - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Cybersecurity threats are targeted by unauthorized users for data stealing, manipulation,
harming the reputation of another organization, and damaging the information system. A …

Unleashing the full potential of artificial intelligence and machine learning in cybersecurity vulnerability management

M Elbes, S Hendawi, S AlZu'bi, T Kanan… - 2023 International …, 2023 - ieeexplore.ieee.org
This research paper investigates the role of Artificial Intelligence (AI) and Machine Learning
(ML) in Cybersecurity Threat Detection. With the increasing frequency and complexity of …

Threat modeling for enterprise cybersecurity architecture

B Bokan, J Santos - 2022 Systems and Information Engineering …, 2022 - ieeexplore.ieee.org
The traditional threat modeling methodologies work well on a small scale, when evaluating
targets such as a data field, a software application, or a system component–but they do not …

Defining Metrics for Comparing Threat Intelligence Solutions Through the Lens of the Analyst

A Plaza, T Hayajneh - 2023 IEEE 14th Annual Ubiquitous …, 2023 - ieeexplore.ieee.org
Threat intelligence can be a valuable tool for any cybersecurity team. However, paid
solutions are often costly. Furthermore, it is difficult to determine what solution is suitable for …