A survey on data-driven software vulnerability assessment and prioritization

THM Le, H Chen, MA Babar - ACM Computing Surveys, 2022 - dl.acm.org
Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security
risks to many software systems. Given the limited resources in practice, SV assessment and …

A Survey on Software Vulnerability Exploitability Assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

A multi-target approach to estimate software vulnerability characteristics and severity scores

G Spanos, L Angelis - Journal of Systems and Software, 2018 - Elsevier
Software vulnerabilities constitute a great risk for the IT community. The specification of the
vulnerability characteristics is a crucial procedure, since the characteristics are used as input …

Common vulnerability scoring system prediction based on open source intelligence information sources

P Kuehn, DN Relke, C Reuter - Computers & Security, 2023 - Elsevier
The number of newly published vulnerabilities is constantly increasing. Until now, the
information available when a new vulnerability is published is manually assessed by experts …

[HTML][HTML] Combining natural language processing and bayesian networks for the probabilistic estimation of the severity of process safety events in hydrocarbon …

D Valcamonico, P Baraldi, E Zio, L Decarli… - Reliability Engineering & …, 2024 - Elsevier
This work investigates the possibility of using the information contained in reports describing
Process Safety Events (PSEs) occurred in hydrocarbon production assets to support …

Automated software vulnerability assessment with concept drift

THM Le, B Sabir, MA Babar - 2019 IEEE/ACM 16th …, 2019 - ieeexplore.ieee.org
Software Engineering researchers are increasingly using Natural Language Processing
(NLP) techniques to automate Software Vulnerabilities (SVs) assessment using the …

Assessment of vulnerability severity using text mining

G Spanos, L Angelis, D Toloudis - Proceedings of the 21st Pan-Hellenic …, 2017 - dl.acm.org
Software1 vulnerabilities are closely associated with information systems security, a major
and critical field in today's technology. Vulnerabilities constitute a constant and increasing …

On the use of fine-grained vulnerable code statements for software vulnerability assessment models

THM Le, MA Babar - Proceedings of the 19th International Conference …, 2022 - dl.acm.org
Many studies have developed Machine Learning (ML) approaches to detect Software
Vulnerabilities (SVs) in functions and fine-grained code statements that cause such SVs …

A recommender system for tracking vulnerabilities

P Huff, K McClanahan, T Le, Q Li - Proceedings of the 16th International …, 2021 - dl.acm.org
Mitigating vulnerabilities in software requires first identifying the vulnerabilities with an
organization's software assets. This seemingly trivial task involves maintaining vendor …

Automated security assessment for the internet of things

X Duan, M Ge, THM Le, F Ullah, S Gao… - 2021 IEEE 26th …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) based applications face an increasing number of potential security
risks, which need to be systematically assessed and addressed. Expert-based manual …