[HTML][HTML] Vulnerability management models using a common vulnerability scoring system

M Walkowski, J Oko, S Sujecki - Applied Sciences, 2021 - mdpi.com
Featured Application The Vulnerability Management Center allows for the improvement of
the quality and efficiency of operation for security operation centers. Abstract Vulnerability …

Automatic part-of-speech tagging for security vulnerability descriptions

S Yitagesu, X Zhang, Z Feng, X Li… - 2021 IEEE/ACM 18th …, 2021 - ieeexplore.ieee.org
In this paper, we study the problem of part-of-speech (POS) tagging for security vulnerability
descriptions (SVD). In contrast to newswire articles, SVD often contains a high-level natural …

Unsupervised labeling and extraction of phrase-based concepts in vulnerability descriptions

S Yitagesu, Z Xing, X Zhang, Z Feng… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
People usually describe the key characteristics of software vulnerabilities in natural
language mixed with domain-specific names and concepts. This textual nature poses a …

Automatic CVSS-based vulnerability prioritization and response with context information

M Walkowski, M Krakowiak… - 2021 International …, 2021 - ieeexplore.ieee.org
Vulnerability prioritisation is essential in the process of the vulnerability management within
an IT network environment. Accurate prioritisation of the detected vulnerabilities is an …

System for estimation CVSS severity metrics of vulnerability based on text mining technology

A Nikonov, A Vulfin, V Vasilyev… - 2021 International …, 2021 - ieeexplore.ieee.org
A system for the automated construction of the components of the vulnerability metrics and a
quantitative assessment of the severity of a vulnerability based on the analysis of its textual …

Система оценки метрик опасности уязвимостей на основе технологий семантического анализа данных

ВИ ВАСИЛЬЕВ, АМ ВУЛЬФИН… - Вестник УрФО …, 2021 - info-secur.ru
Аннотация Предложена система прогнозирования компонент вектора метрик
уязвимостей и количественной оценки степени опасности этих уязвимостей на основе …

Применение методов интеллектуального анализа текстов при решении задач обеспечения информационной безопасности

НВ Кучкарова - … ТЕХНОЛОГИИ ОБЕСПЕЧЕНИЯ КОМПЛЕКСНОЙ …, 2021 - elibrary.ru
Рассмотрены возможности применения методов и технологий интеллектуального
анализа текстов (Text Mining) при решении задач, связанных с обеспечением …

Predictive Protection of Enterprises from Cyber Attacks

R Liu - 2021 - search.proquest.com
Enterprises are faced with various cyber security threats. In this dissertation, we focus on
three aspects of cyber security threats: 1) cyber vulnerability prediction and patching, 2) …