[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Alert Prioritisation in Security Operations Centres: A Systematic Survey on Criteria and Methods

F Jalalvand, M Baruwal Chhetri, S Nepal… - ACM Computing …, 2024 - dl.acm.org
Security Operations Centres (SOCs) are specialised facilities where security analysts
leverage advanced technologies to monitor, detect and respond to cyber incidents …

Shedding light on CVSS scoring inconsistencies: A user-centric study on evaluating widespread security vulnerabilities

J Wunder, A Kurtz, C Eichenmüller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
The Common Vulnerability Scoring System (CVSS) is a popular method for evaluating the
severity of vulnerabilities in vulnerability management. In the evaluation process, a numeric …

Can We Trust the Default Vulnerabilities Severity?

M Esposito, S Moreschini, V Lenarduzzi… - 2023 IEEE 23rd …, 2023 - ieeexplore.ieee.org
As software systems become increasingly complex and interconnected, the risk of security
debt has risen significantly, increasing cyber-attacks and data breaches. Vulnerability …

A hybrid scoring system for prioritization of software vulnerabilities

A Sharma, S Sabharwal, S Nagpal - Computers & Security, 2023 - Elsevier
While security experts, firms, security providers, threat analysts all around the globe are
working hard to provide ironclad security for information system softwares, vulnerabilities in …

AUTOMATED VULNERABILITY PRIORITIZATION AND REMEDIATION USING DEEP LEARNING

V Dhiman - JOURNAL OF BASIC SCIENCE AND ENGINEERING, 2023 - yigkx.org.cn
Effective vulnerability management is essential in the quickly developing field of
cybersecurity to protect information systems from new attacks. Conventional methods, such …

Artificial intelligence for system security assurance: A systematic literature review

SF Wen, A Shukla, B Katt - International Journal of Information Security, 2025 - Springer
Abstract System Security Assurance (SSA) has emerged as a critical methodology for
organizations to verify the trustworthiness of their systems by evaluating security measures …

Enhancing Security in Cloud Computing Using Artificial Intelligence (AI)

D Stutz, JT de Assis, AA Laghari… - … Analytics and Cyber …, 2024 - Wiley Online Library
Cloud computing (CC) technologies (viz artificial intelligence (AI), data science,
blockchain,“big data”(BD), etc.) are progressively widespread and practically applied …

An approach to characterize the security of open-source functions using lsp

JDA Pereira, M Vieira - 2023 IEEE 34th International …, 2023 - ieeexplore.ieee.org
The malicious exploitation of security flaws by attackers can lead to a range of problems.
While several techniques and tools allow detecting vulnerabilities during the Software …

ILLATION: Improving Vulnerability Risk Prioritization By Learning From Network

Z Zeng, D Huang, G Xue, Y Deng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Network administrators face the challenge of efficiently patching overwhelming volumes of
vulnerabilities with limited time and resources. To address this issue, they must prioritize …