Linking cve's to mitre att&ck techniques

A Kuppa, L Aouad, NA Le-Khac - … of the 16th International Conference on …, 2021 - dl.acm.org
The MITRE Corporation is a non-profit organization that has made substantial efforts into
creating and maintaining knowledge bases relevant to cybersecurity and has been widely …

Exploitability prediction of software vulnerabilities

N Bhatt, A Anand, VSS Yadavalli - Quality and Reliability …, 2021 - Wiley Online Library
The number of security failure discovered and disclosed publicly are increasing at a pace
like never before. Wherein, a small fraction of vulnerabilities encountered in the operational …

[PDF][PDF] Network intrusion detection system using deep learning technique

DI Edeh - Master of Science, Department of Computing …, 2021 - utupub.fi
The performance results of the FFDNNs were calculated based on some important metrics
(FPR, FAR, F1 Measure, Precision), and these were compared to the conventional ML …

[HTML][HTML] Time lag-based modelling for software vulnerability exploitation process

A Anand, N Bhatt, J Kaur… - Journal of Cyber …, 2021 - journals.riverpublishers.com
With the increase in the discovery of vulnerabilities, the expected exploits occurred in
various software platform has shown an increased growth with respect to time. Only after …

Predicting the existence of exploitation concepts linked to software vulnerabilities using text mining

K Charmanas, N Mittas, L Angelis - … of the 25th Pan-Hellenic Conference …, 2021 - dl.acm.org
Software vulnerabilities are weaknesses of specific products and versions that may lead in
benefiting attackers to exploit such malfunctions, having a further goal to gain access to …

[图书][B] Software Source Code: Statistical Modeling

RR Althar, D Samanta, D Konar, S Bhattacharyya - 2021 - books.google.com
This book will focus on utilizing statistical modelling of the software source code, in order to
resolve issues associated with the software development processes. Writing and …

[图书][B] Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense

E Marin, M Almukaynizi, S Sarkar, E Nunes… - 2021 - books.google.com
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online
communication of these threat actors can help reduce the risk of attacks. This book shifts …

Zum Stand der Dinge

A Lunkeit, W Zimmer, A Lunkeit, W Zimmer - Security by Design: Security …, 2021 - Springer
Insbesondere zwei Entwicklungen greifen derzeit tief in unsere Arbeits-und Lebenswelten
ein: cyber-physische Systeme (CPS) und das Internet-der-Dinge. Ihre Allgegenwart wird nur …