Risk prioritization by leveraging latent vulnerability features in a contested environment

K Alperin, A Wollaber, D Ross, P Trepagnier… - Proceedings of the 12th …, 2019 - dl.acm.org
vulnerability feature, we extended the vulnerability feature space by incorporating additional
features … The importance metric is still given by a vulnerability-exploit relationship, but by …

[HTML][HTML] An environment-specific prioritization model for information-security vulnerabilities based on risk factor analysis

J Reyes, W Fuertes, P Arévalo, M Macas - Electronics, 2022 - mdpi.com
risk factor for the IT asset where the vulnerability is located, this study proposes the development
of a prioritization model that uses Shodan as a vulnerability … A key feature is that the …

[HTML][HTML] Automated context-aware vulnerability risk management for patch prioritization

V Ahmadi Mehri, P Arlos, E Casalicchio - Electronics, 2022 - mdpi.com
… For example, authors in [20] built their decision tree based on data of the asset and vulnerability
features for a power grid and reached 97% accuracy. However, their solution is domain-…

Licality—likelihood and criticality: Vulnerability risk prioritization through logical reasoning and deep learning

Z Zeng, Z Yang, D Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… In Section II, we describe the related work of assessing vulnerabilitiesrisk and background
on features and tools used in our solution. Section III explains the motivation of LICALITY. …

Software vulnerability prioritization using vulnerability description

R Sharma, R Sibal, S Sabharwal - International Journal of System …, 2021 - Springer
features for the categorization task. The proposed system helps to channelize the efforts of
the testing team by prioritizing the newly found vulnerabilities … so that the risk is minimized. By …

Vulcon: A system for vulnerability prioritization, mitigation, and management

KA Farris, A Shah, G Cybenko, R Ganesan… - ACM Transactions on …, 2018 - dl.acm.org
… , we have to scientifically define which vulnerability features bear the greatest influence on
overall “… (4) Risk Level: A one-word description to annotate vulnerability severity. The software …

[PDF][PDF] Prioritizing vulnerability response: A stakeholder-specific vulnerability categorization

JM Spring, E Hatleback… - … , PA, White Paper, 2019 - insights.sei.cmu.edu
… into hard-to-use optional features. Given this, as much as it is … is for prioritizing vulnerabilities
based on the risk stemming from exploitation. The cost of patching, the other side of the risk

Prioritizing software vulnerability types using multi-criteria decision-making techniques

R Sibal, R Sharma, S Sabharwal - Life Cycle Reliability and Safety …, 2017 - Springer
vulnerabilities and their fixation to minimize the potential risk they present. Vulnerability
prioritization … , and interdependence among the unpredictable features or attributes. This method …

[PDF][PDF] Prioritizing vulnerability response: A stakeholder-specific vulnerability categorization (version 2.0)

JM Spring, A Householder, E Hatleback, A Manion… - 2021 - resources.sei.cmu.edu
… SSVC presents a risk prioritization method that might be useful or at least allied to other
risk … fixes for multiple vulnerabilities and, often, new or improved features. Supplier output is …

Risk-Based Network Vulnerability Prioritization

Z Zeng - 2022 - search.proquest.com
… Thus, an efficient and effective vulnerability prioritization … proposes a novel risk-based
vulnerability prioritization framework that … vulnerability risk features contribute to the proposed risk-…