Identifying vulnerabilities using internet-wide scanning data
Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect
active reconnaissance results for online devices. Access to this information is provided …
active reconnaissance results for online devices. Access to this information is provided …
Limits of machine learning for automatic vulnerability detection
Recent results of machine learning for automatic vulnerability detection have been very
promising indeed: Given only the source code of a function $ f $, models trained by machine …
promising indeed: Given only the source code of a function $ f $, models trained by machine …
{Large-Scale} Evaluation of a Vulnerability Analysis Framework
Ensuring that exploitable vulnerabilities do not exist in a piece of software written using type-
unsafe languages (eg, C/C++) is still a challenging, largely unsolved problem. Current …
unsafe languages (eg, C/C++) is still a challenging, largely unsolved problem. Current …
[PDF][PDF] REVS: A Vulnerability Ranking Tool for Enterprise Security.
I Forain, R de Oliveira Albuquerque… - ICEIS (2), 2022 - ppee.unb.br
Information security incidents currently affect organizations worldwide. In 2021, thousands of
companies suffered cyber attacks, resulting in billions of dollars in losses. Most of these …
companies suffered cyber attacks, resulting in billions of dollars in losses. Most of these …
Automated CVE Analysis for Threat Prioritization and Impact Prediction
The Common Vulnerabilities and Exposures (CVE) are pivotal information for proactive
cybersecurity measures, including service patching, security hardening, and more. However …
cybersecurity measures, including service patching, security hardening, and more. However …
Threatzoom: CVE2CWE using hierarchical neural network
E Aghaei, W Shadid, E Al-Shaer - arXiv preprint arXiv:2009.11501, 2020 - arxiv.org
The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing
publicly known information security vulnerabilities. One or more CVEs are grouped into the …
publicly known information security vulnerabilities. One or more CVEs are grouped into the …
CADS-ML/DL: efficient cloud-based multi-attack detection system
S Farhat, M Abdelkader, A Meddeb-Makhlouf… - International Journal of …, 2023 - Springer
With the increasing adoption of cloud computing, securing cloud-based systems and
applications has become a critical concern for almost every organization. Traditional security …
applications has become a critical concern for almost every organization. Traditional security …
mvulpreter: A multi-granularity vulnerability detection system with interpretations
Due to the powerful automatic feature extraction, deep learning-based vulnerability
detection methods have evolved significantly in recent years. However, almost all current …
detection methods have evolved significantly in recent years. However, almost all current …
Scoring cyber vulnerabilities based on their impact on organizational goals
O Keskin, N Gannon, B Lopez… - 2021 Systems and …, 2021 - ieeexplore.ieee.org
Vulnerability Management, which is a vital part of risk and resiliency management efforts, is
a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on …
a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on …
[HTML][HTML] A CNN-based automatic vulnerability detection
JH An, Z Wang, I Joe - EURASIP Journal on Wireless Communications …, 2023 - Springer
With the advent of the Internet, the activities of individuals and businesses have expanded
into the online realm. As a result, vulnerabilities that result in actual breaches can lead to …
into the online realm. As a result, vulnerabilities that result in actual breaches can lead to …