A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

[HTML][HTML] A social network of crime: A review of the use of social networks for crime and the detection of crime

B Drury, SM Drury, MA Rahman, I Ullah - Online Social Networks and …, 2022 - Elsevier
Social media is used to commit and detect crimes. With automated methods, it is possible to
scale both crime and detection of crime to a large number of people. The ability of criminals …

Common vulnerability scoring system prediction based on open source intelligence information sources

P Kühn, DN Relke, C Reuter - Computers & Security, 2023 - Elsevier
The number of newly published vulnerabilities is constantly increasing. Until now, the
information available when a new vulnerability is published is manually assessed by experts …

Predicting cvss metric via description interpretation

JC Costa, T Roxo, JBF Sequeiros, H Proenca… - IEEE …, 2022 - ieeexplore.ieee.org
Cybercrime affects companies worldwide, costing millions of dollars annually. The constant
increase of threats and vulnerabilities raises the need to handle vulnerabilities in a …

[HTML][HTML] An environment-specific prioritization model for information-security vulnerabilities based on risk factor analysis

J Reyes, W Fuertes, P Arévalo, M Macas - Electronics, 2022 - mdpi.com
Vulnerabilities represent a constant and growing risk for organizations. Their successful
exploitation compromises the integrity and availability of systems. The use of specialized …

Towards an improved understanding of software vulnerability assessment using data-driven approaches

THM Le - arXiv preprint arXiv:2207.11708, 2022 - arxiv.org
The thesis advances the field of software security by providing knowledge and automation
support for software vulnerability assessment using data-driven approaches. Software …

System for estimation CVSS severity metrics of vulnerability based on text mining technology

A Nikonov, A Vulfin, V Vasilyev… - 2021 International …, 2021 - ieeexplore.ieee.org
A system for the automated construction of the components of the vulnerability metrics and a
quantitative assessment of the severity of a vulnerability based on the analysis of its textual …

[PDF][PDF] 基于图深度学习的漏洞检测

董继平, 郭启全, 高春东, 郝蒙蒙, 江东 - 科技导报, 2023 - kjdb.org
摘要图深度学习技术在处理非欧氏结构数据中显示了巨大潜力, 大量研究工作尝试将图嵌入或图
神经网络应用到漏洞检测中. 梳理了基于图深度学习的漏洞检测方法, 按其一般流程 …

The Notion of Relevance in Cybersecurity: A Categorization of Security Tools and Deduction of Relevance Notions

P Kuehn, J Bäumler, MA Kaufhold, M Wendelborn… - 2022 - dl.gi.de
Proper cybersecurity requires timely information to defend the IT infrastructure. In a dynamic
field like cybersecurity, gathering up-to-date information is usually a manual, time …