[HTML][HTML] The anatomy of a vulnerability database: A systematic mapping study

X Li, S Moreschini, Z Zhang, F Palomba… - Journal of Systems and …, 2023 - Elsevier
Software vulnerabilities play a major role, as there are multiple risks associated, including
loss and manipulation of private data. The software engineering research community has …

Cve2att&ck: Bert-based mapping of cves to mitre att&ck techniques

O Grigorescu, A Nica, M Dascalu, R Rughinis - Algorithms, 2022 - mdpi.com
Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a
global, standardized cyber-security knowledge database has emerged as a means to …

Analyzing Threat Vectors in ICS Cyberattacks

I Villanueva-Miranda, M Akbar - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The rise in cyberattacks on Industrial Control Systems (ICS) shows the need for enhanced
security measures. Integrating diverse cybersecurity datasets is essential to provide a …

Cybersecurity Defenses: Exploration of CVE Types Through Attack Descriptions

R Othman, B Rossi, B Russo - 2024 50th Euromicro …, 2024 - ieeexplore.ieee.org
Vulnerabilities in software security can remain undiscovered even after being exploited.
Linking attacks to vulnerabilities helps experts identify and respond promptly to the incident …

Contextual remediations prioritization system designed to implement theoretical principles of CVSS v4

O Grigorescu, LF Botezatu, A Mutu… - UPB Scientific Bulletin …, 2024 - ibn.idsi.md
Technological advancements have led to an unprecedented expansion in the number and
complexity of device interconnections. This brisk pace of adoption, while indicative of …

[PDF][PDF] Ph. D. Summary Thesis

O Grigorescu - 2023 - docs.upb.ro
The discipline of cybersecurity has become progressively critical in protecting societal
processes within the interconnected global community of today. With the proliferation of …

Analysis of vulnerabilities and techniques of attacks of computer systems and networks

T Derrick - 2023 - 24.199.116.31
Faced with the exponential growth of data, their security has become a major issue for
businesses and individuals. This has led to new professions such as computer security …