A Compact Vulnerability Knowledge Graph for Risk Assessment

J Yin, W Hong, H Wang, J Cao, Y Miao… - ACM Transactions on …, 2024 - dl.acm.org
Software vulnerabilities, also known as flaws, bugs or weaknesses, are common in modern
information systems, putting critical data of organizations and individuals at cyber risk. Due …

[PDF][PDF] When ChatGPT Meets Vulnerability Management: the Good, the Bad, and the Ugly

K McClanahan, S Elder, ML Uwibambe, Y Liu… - IEEE Int'l Conf. on …, 2024 - conf-icnc.org
Vulnerability management is a very challenging and time-consuming task. For many
organizations, security operators need to learn about the properties of vulnerabilities to …

Advancing Software Vulnerability Scoring: A Statistical Approach with Machine Learning Techniques and GridSearchCV Parameter Tuning

BK Verma, AK Yadav - SN Computer Science, 2024 - Springer
The growing complexity, diversity, and importance of software pose a significant threat to
computer system security due to exploitable software vulnerabilities. Important infrastructure …

Artificial Intelligence-Enabled Vulnerability Analysis and Management for It Infrastructure: A Computational Design Science Approach

S Ullman - 2024 - search.proquest.com
Abstract Modern Information Technology (IT) infrastructure and open-source software (OSS)
have revolutionized our ability to access and process data, enabling us to tackle …

and Toshihiro Yamauchi5D

H Kuzuno¹, T Yano, K Omo… - … Conference, WISA 2023 …, 2024 - books.google.com
Recently, open source software (OSS) has become more mainstream. Therefore, the
security of OSS is an important topic in information systems that use OSS. When …

A novel transformer-based multi-step approach for predicting common vulnerability severity score

S Bahmanisangesari - 2024 - unbscholar.lib.unb.ca
The timely prediction of Common Vulnerability Severity Scores (CVSS) following the release
of Common Vulnerabilities and Exposures (CVE) announcements is crucial for enhancing …