Common vulnerability scoring system prediction based on open source intelligence information sources

P Kuehn, DN Relke, C Reuter - Computers & Security, 2023 - Elsevier
The number of newly published vulnerabilities is constantly increasing. Until now, the
information available when a new vulnerability is published is manually assessed by experts …

Automated event extraction of CVE descriptions

Y Wei, L Bo, X Sun, B Li, T Zhang, C Tao - Information and Software …, 2023 - Elsevier
Context: The dramatically increasing number of vulnerabilities makes manual vulnerability
analysis increasingly more difficult. Automatic extraction of vulnerability information can help …

Automatic software vulnerability assessment by extracting vulnerability elements

X Sun, Z Ye, L Bo, X Wu, Y Wei, T Zhang, B Li - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities take threats to software security. When faced with multiple software
vulnerabilities, the most urgent ones need to be fixed first. Therefore, it is critical to assess …

A survey on automated software vulnerability detection using machine learning and deep learning

NS Harzevili, AB Belle, J Wang, S Wang, Z Ming… - arXiv preprint arXiv …, 2023 - arxiv.org
Software vulnerability detection is critical in software security because it identifies potential
bugs in software systems, enabling immediate remediation and mitigation measures to be …

Exploitation of vulnerabilities: a topic-based machine learning framework for explaining and predicting exploitation

K Charmanas, N Mittas, L Angelis - Information, 2023 - mdpi.com
Security vulnerabilities constitute one of the most important weaknesses of hardware and
software security that can cause severe damage to systems, applications, and users. As a …

A novel vulnerability severity assessment method for source code based on a graph neural network

J Hao, S Luo, L Pan - Information and Software Technology, 2023 - Elsevier
Context Vulnerability severity assessment is an important part of vulnerability management
that can help security personnel determine the priority of vulnerability repair work. Objective …

Extraction of phrase-based concepts in vulnerability descriptions through unsupervised labeling

S Yitagesu, Z Xing, X Zhang, Z Feng, X Li… - ACM Transactions on …, 2023 - dl.acm.org
Software vulnerabilities, once disclosed, can be documented in vulnerability databases,
which have great potential to advance vulnerability analysis and security research. People …

Security Risk Indicator for Open Source Software to Measure Software Development Status

H Kuzuno, T Yano, K Omo, J van der Ham… - … on Information Security …, 2023 - Springer
Recently, open source software (OSS) has become more mainstream. Therefore, the
security of OSS is an important topic in information systems that use OSS. When …

OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets

H Eskandari, M Bewong - arXiv preprint arXiv:2304.10511, 2023 - arxiv.org
An ever-growing number of vulnerabilities are reported every day. Yet these vulnerabilities
are not all the same; Some are more targeted than others. Correctly estimating the likelihood …

Predictive Model for Cyber Attacks to Assess Financial Exposure for IoHT/IoMT

A Sanders - 2023 - search.proquest.com
Cybersecurity incidents for Internet of Health Things (IoHT) and Internet of Medical Things
(IoMT) organizations are rising. The Common Vulnerability Score System (CVSS) provides a …