[PDF][PDF] Comparison and analysis of software vulnerability databases

H KEKÜL, B ERGEN, H ARSLAN - International Journal of …, 2022 - academia.edu
In order to protect information systems against threats and vulnerabilities, security breaches
should be analyzed. In this case, analysts primarily conduct intelligence research through …

[PDF][PDF] A multiclass approach to estimating software vulnerability severity rating with statistical and word embedding methods

H Kekül, B ERGEN, H ARSLAN - Int J Comput Netw Inf Secur, 2022 - mecs-press.org
The analysis and grading of software vulnerabilities is an important process that is done
manually by experts today. For this reason, there are time delays, human errors, and …

Risk forecasting of data confidentiality breach using linear regression algorithm

О Korystin, S Nataliia, O Mitina - International Journal of …, 2022 - search.proquest.com
The paper focuses on the study of cyber security in Ukraine and creation of a predictive
model for reducing the risk of identified cyber threats. Forecasting is performed using a …

Yazılım güvenlik açığı veri tabanları

H Kekül, B Ergen, H Arslan - Avrupa Bilim ve Teknoloji Dergisi, 2021 - dergipark.org.tr
Bir yazılım bileşeninin güvenlik açığı eğiliminin öngörülmesi, yazılım mühendisliğinin
zorlayıcı araştırma alanlarından biridir. Bir bileşenin güvenlik açığı eğilimi hakkında önceden …

[PDF][PDF] Detection of Unknown Insider Attack on Components of Big Data System: A Smart System Application for Big Data Cluster

S Paul, S Saha, RT Goswami - International Journal of Computer …, 2022 - academia.edu
Big data applications running on a big data cluster, creates a set of process on different
nodes and exchange data via regular network protocols. The nodes of the cluster may …

[PDF][PDF] Estimating Missing Security Vectors in NVD Database Security Reports

H KEKÜL, B ERGEN, H ARSLAN - International Journal of …, 2022 - mecs-press.org
Detection and analysis of software vulnerabilities is a very important consideration. For this
reason, software security vulnerabilities that have been identified for many years are listed …

[PDF][PDF] Comparative Risk Assessment of Cyber Threats Based on Average and Fuzzy Sets Theory

OE Korystin, O Korchenko, S Kazmirchuk, S Demediuk… - mecs-press.org
Applied results of scientific analysis should be the key focus of modern security research. A
comparative analysis of research results obtained using different methods, as an applied …