[PDF][PDF] VEST: A System for Vulnerability Exploit Scoring & Timing.

H Chen, J Liu, R Liu, N Park, VS Subrahmanian - IJCAI, 2019 - ijcai.org
Knowing if/when a cyber-vulnerability will be exploited and how severe the vulnerability is
can help enterprise security officers (ESOs) come up with appropriate patching schedules …

Exploit prediction scoring system (epss)

J Jacobs, S Romanosky, B Edwards, I Adjerid… - … Threats: Research and …, 2021 - dl.acm.org
Despite the large investments in information security technologies and research over the
past decades, the information security industry is still immature when it comes to …

The effect of common vulnerability scoring system metrics on vulnerability exploit delay

A Feutrill, D Ranathunga, Y Yarom… - … on Computing and …, 2018 - ieeexplore.ieee.org
Modern system administrators need to monitor disclosed software vulnerabilities and
address applicable vulnerabilities via patching, reconfiguration and other measures. In …

Historical analysis of exploit availability timelines

AD Householder, J Chrabaszcz, T Novelly… - 13th USENIX Workshop …, 2020 - usenix.org
Vulnerability management is an important cybersecurity function. Within vulnerability
management, there are multiple points where knowing whether an exploit targeting a given …

Managing enterprise risks of technological systems: An exploratory empirical analysis of vulnerability characteristics as drivers of exploit publication

R Sen, GR Heim - Decision Sciences, 2016 - Wiley Online Library
Enterprises experience opportunistic exploits targeted at vulnerable technology.
Vulnerabilities in software‐based applications, service systems, enterprise platforms, and …

Predicting exploit likelihood for cyber vulnerabilities with machine learning

M Edkrantz - 2015 - odr.chalmers.se
Every day there are some 20 new cyber vulnerabilities released, each exposing some
software weakness. For an information security manager it can be a daunting task to keep …

Comparing vulnerability severity and exploits using case-control studies

L Allodi, F Massacci - ACM Transactions on Information and System …, 2014 - dl.acm.org
(US) Rule-based policies for mitigating software risk suggest using the CVSS score to
measure the risk of an individual vulnerability and act accordingly. A key issue is whether …

Improving vulnerability remediation through better exploit prediction

J Jacobs, S Romanosky, I Adjerid… - Journal of …, 2020 - academic.oup.com
Despite significant innovations in IT security products and research over the past 20 years,
the information security field is still immature and struggling. Practitioners lack the ability to …

[PDF][PDF] Quantifying patch management

A Shostack - Secure Business Quarterly, 2003 - adam.shostack.org
Nine out of ten break-ins reported to CERT, the Computer Emergency Response Team,
exploit known vulnerabilities. The most effective way to dramatically reduce the number of …

Predicting cyber vulnerability exploits with machine learning

M Edkrantz, A Said - Thirteenth Scandinavian Conference on …, 2015 - ebooks.iospress.nl
For an information security manager it can be a daunting task to keep up and assess which
new cyber vulnerabilities to prioritize patching first. Every day numerous new vulnerabilities …