Risk prioritization by leveraging latent vulnerability features in a contested environment
… vulnerability feature, we extended the vulnerability feature space by incorporating additional
features … The importance metric is still given by a vulnerability-exploit relationship, but by …
features … The importance metric is still given by a vulnerability-exploit relationship, but by …
[HTML][HTML] An environment-specific prioritization model for information-security vulnerabilities based on risk factor analysis
… risk factor for the IT asset where the vulnerability is located, this study proposes the development
of a prioritization model that uses Shodan as a vulnerability … A key feature is that the …
of a prioritization model that uses Shodan as a vulnerability … A key feature is that the …
[HTML][HTML] Automated context-aware vulnerability risk management for patch prioritization
… For example, authors in [20] built their decision tree based on data of the asset and vulnerability
features for a power grid and reached 97% accuracy. However, their solution is domain-…
features for a power grid and reached 97% accuracy. However, their solution is domain-…
Licality—likelihood and criticality: Vulnerability risk prioritization through logical reasoning and deep learning
… In Section II, we describe the related work of assessing vulnerabilities’ risk and background
on features and tools used in our solution. Section III explains the motivation of LICALITY. …
on features and tools used in our solution. Section III explains the motivation of LICALITY. …
Software vulnerability prioritization using vulnerability description
R Sharma, R Sibal, S Sabharwal - International Journal of System …, 2021 - Springer
… features for the categorization task. The proposed system helps to channelize the efforts of
the testing team by prioritizing the newly found vulnerabilities … so that the risk is minimized. By …
the testing team by prioritizing the newly found vulnerabilities … so that the risk is minimized. By …
Vulcon: A system for vulnerability prioritization, mitigation, and management
… , we have to scientifically define which vulnerability features bear the greatest influence on
overall “… (4) Risk Level: A one-word description to annotate vulnerability severity. The software …
overall “… (4) Risk Level: A one-word description to annotate vulnerability severity. The software …
[PDF][PDF] Prioritizing vulnerability response: A stakeholder-specific vulnerability categorization
JM Spring, E Hatleback… - … , PA, White Paper, 2019 - insights.sei.cmu.edu
… into hard-to-use optional features. Given this, as much as it is … is for prioritizing vulnerabilities
based on the risk stemming from exploitation. The cost of patching, the other side of the risk …
based on the risk stemming from exploitation. The cost of patching, the other side of the risk …
Prioritizing software vulnerability types using multi-criteria decision-making techniques
R Sibal, R Sharma, S Sabharwal - Life Cycle Reliability and Safety …, 2017 - Springer
… vulnerabilities and their fixation to minimize the potential risk they present. Vulnerability
prioritization … , and interdependence among the unpredictable features or attributes. This method …
prioritization … , and interdependence among the unpredictable features or attributes. This method …
[PDF][PDF] Prioritizing vulnerability response: A stakeholder-specific vulnerability categorization (version 2.0)
… SSVC presents a risk prioritization method that might be useful or at least allied to other
risk … fixes for multiple vulnerabilities and, often, new or improved features. Supplier output is …
risk … fixes for multiple vulnerabilities and, often, new or improved features. Supplier output is …
Risk-Based Network Vulnerability Prioritization
Z Zeng - 2022 - search.proquest.com
… Thus, an efficient and effective vulnerability prioritization … proposes a novel risk-based
vulnerability prioritization framework that … vulnerability risk features contribute to the proposed risk-…
vulnerability prioritization framework that … vulnerability risk features contribute to the proposed risk-…
相关搜索
- contested environment vulnerability features
- software vulnerability prioritization
- vulnerability risk management
- analytic hierarchy process vulnerability prioritization
- vulnerability detection tools network risk evaluation
- vulnerability prediction survey of feature selection
- national vulnerability database cyber risks
- risk factor analysis prioritization model
- contested environment risk prioritization