An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network

Q Wang, Y Gao, J Ren, B Zhang - Computers & Security, 2023 - Elsevier
To address the problem that the traditional vectored representation of software vulnerability
data has high-dimensional sparsity and leads to unsatisfactory automatic classification, this …

How does Endpoint Detection use the {MITRE}{ATT&CK} Framework?

A Virkud, MA Inam, A Riddle, J Liu, G Wang… - 33rd USENIX Security …, 2024 - usenix.org
MITRE ATT&CK is an open-source taxonomy of adversary tactics, techniques, and
procedures based on real-world observations. Increasingly, organizations leverage ATT&CK …

Genics: a framework for generating attack scenarios for cybersecurity exercises on industrial control systems

IS Song, S Jeon, D Kim, MG Lee, JT Seo - Applied Sciences, 2024 - mdpi.com
Due to the nature of the industrial control systems (ICS) environment, where process
continuity is essential, intentionally initiating a cyberattack to check security controls can …

Unveiling Human Factors: Aligning Facets of Cybersecurity Leadership, Insider Threats, and Arsonist Attributes to Reduce Cyber Risk

LA Jones - SocioEconomic Challenges, 2024 - armgpublishing.com
This qualitative study is a systematic literature review (draws on literature primarily
published within the last five years) addresses a comprehensive approach to a crucial but …

Unveiling the Landscape of Operating System Vulnerabilities

M Bhurtel, DB Rawat - Future Internet, 2023 - mdpi.com
Operating systems play a crucial role in computer systems, serving as the fundamental
infrastructure that supports a wide range of applications and services. However, they are …

SEAG: A novel dynamic security risk assessment method for industrial control systems with consideration of social engineering

K Liu, Y Xie, S Xie, L Sun - Journal of Process Control, 2023 - Elsevier
The development of information and communication technology and its wide application in
industrial control systems (ICSs) has brought a growing number of security risks to ICSs …

Severity-based triage of cybersecurity incidents using kill chain attack graphs

L Sadlek, MM Yamin, P Čeleda, B Katt - Journal of Information Security and …, 2025 - Elsevier
Security teams process a vast number of security events. Their security analysts spend
considerable time triaging cybersecurity alerts. Many alerts reveal incidents that must be …

GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs

MR Al-Eiadeh, M Abdallah - Computers & Security, 2024 - Elsevier
We design a resource allocation framework for securing interdependent systems managed
by multiple defenders. Our framework models these multi-defender interdependent systems …

Vulnerability-oriented risk identification framework for IoT risk assessment

M Beyrouti, A Lounis, B Lussier, A Bouabdallah… - Internet of Things, 2024 - Elsevier
The proliferation of Internet of Things (IoT) systems across diverse applications has led to a
notable increase in connected smart devices. Nevertheless, this surge in connectivity has …

[PDF][PDF] Оценивание защищенности информационных систем на основе графовой модели эксплойтов

ЕВ Федорченко, ИВ Котенко… - Вопросы …, 2023 - cyberrus.info
Одной из важнейших задач мониторинга информа8 ционной безопасности является
автоматизация процес8 са выявления и оценивания слабых мест защищаемой …