[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

[HTML][HTML] Static analysis of information systems for IoT cyber security: a survey of machine learning approaches

I Kotenko, K Izrailov, M Buinevich - Sensors, 2022 - mdpi.com
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …

Vulexplainer: A transformer-based hierarchical distillation for explaining vulnerability types

M Fu, V Nguyen, CK Tantithamthavorn… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Deep learning-based vulnerability prediction approaches are proposed to help under-
resourced security practitioners to detect vulnerable functions. However, security …

[HTML][HTML] AIBugHunter: A Practical tool for predicting, classifying and repairing software vulnerabilities

M Fu, C Tantithamthavorn, T Le, Y Kume… - Empirical Software …, 2024 - Springer
Abstract Many Machine Learning (ML)-based approaches have been proposed to
automatically detect, localize, and repair software vulnerabilities. While ML-based methods …

V2w-bert: A framework for effective hierarchical multiclass classification of software vulnerabilities

SS Das, E Serra, M Halappanavar… - 2021 IEEE 8th …, 2021 - ieeexplore.ieee.org
We consider the problem of automating the mapping of observed vulnerabilities in software
listed in Common Vulnerabilities and Exposures (CVE) reports to weaknesses listed in …

Fine-grained commit-level vulnerability type prediction by CWE tree structure

S Pan, L Bao, X Xia, D Lo, S Li - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Identifying security patches via code commits to allow early warnings and timely fixes for
Open Source Software (OSS) has received increasing attention. However, the existing …

Chain-of-thought prompting of large language models for discovering and fixing software vulnerabilities

Y Nong, M Aldeen, L Cheng, H Hu, F Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
Security vulnerabilities are increasingly prevalent in modern software and they are widely
consequential to our society. Various approaches to defending against these vulnerabilities …

Automated event extraction of CVE descriptions

Y Wei, L Bo, X Sun, B Li, T Zhang, C Tao - Information and Software …, 2023 - Elsevier
Context: The dramatically increasing number of vulnerabilities makes manual vulnerability
analysis increasingly more difficult. Automatic extraction of vulnerability information can help …

Predicting entity relations across different security databases by using graph attention network

L Yuan, Y Bai, Z Xing, S Chen, X Li… - 2021 IEEE 45th Annual …, 2021 - ieeexplore.ieee.org
Security databases such as Common Vulnerabilities and Exposures (CVE), Common
Weakness Enumeration (CWE), and Common Attack Pattern Enumeration and Classification …