Machine Learning (ML) represents a pivotal technology for current and future information systems, and many domains already leverage the capabilities of ML. However, deployment …
Social media is used to commit and detect crimes. With automated methods, it is possible to scale both crime and detection of crime to a large number of people. The ability of criminals …
P Kühn, DN Relke, C Reuter - Computers & Security, 2023 - Elsevier
The number of newly published vulnerabilities is constantly increasing. Until now, the information available when a new vulnerability is published is manually assessed by experts …
Cybercrime affects companies worldwide, costing millions of dollars annually. The constant increase of threats and vulnerabilities raises the need to handle vulnerabilities in a …
J Reyes, W Fuertes, P Arévalo, M Macas - Electronics, 2022 - mdpi.com
Vulnerabilities represent a constant and growing risk for organizations. Their successful exploitation compromises the integrity and availability of systems. The use of specialized …
THM Le - arXiv preprint arXiv:2207.11708, 2022 - arxiv.org
The thesis advances the field of software security by providing knowledge and automation support for software vulnerability assessment using data-driven approaches. Software …
A Nikonov, A Vulfin, V Vasilyev… - 2021 International …, 2021 - ieeexplore.ieee.org
A system for the automated construction of the components of the vulnerability metrics and a quantitative assessment of the severity of a vulnerability based on the analysis of its textual …
Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic field like cybersecurity, gathering up-to-date information is usually a manual, time …