Review of cybersecurity assessment methods: Applicability perspective

R Leszczyna - Computers & Security, 2021 - Elsevier
Cybersecurity assessments are crucial in building the assurance that vital cyberassets are
effectively protected from threats. Multiple assessment methods have been proposed during …

A Survey on Software Vulnerability Exploitability Assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

Cvss-bert: Explainable natural language processing to determine the severity of a computer security vulnerability from its description

MR Shahid, H Debar - 2021 20th IEEE International …, 2021 - ieeexplore.ieee.org
When a new computer security vulnerability is publicly disclosed, only a textual description
of it is available. Cybersecurity experts later provide an analysis of the severity of the …

An automatic software vulnerability classification framework using term frequency-inverse gravity moment and feature selection

J Chen, PK Kudjo, S Mensah, SA Brown… - Journal of Systems and …, 2020 - Elsevier
Vulnerability classification is an important activity in software development and software
quality maintenance. A typical vulnerability classification model usually involves a stage of …

Detecting the impact of software vulnerability on attacks: A case study of network telescope scans

A Houmz, G Mezzour, K Zkik, M Ghogho… - Journal of Network and …, 2021 - Elsevier
Network scanning is one of the first steps in gathering information about a target before
launching attacks. It is used to scan for vulnerable devices and exposed services in order to …

Research on intelligent recognition method of software vulnerability severity based on event extraction

X Wu, S Wen, H Lin, W Zheng, S Weng, X Sun - 2023 - researchsquare.com
The number of vulnerability reports is rapidly increasing, and relying on human resources for
vulnerability analysis will become more difficult. In addition, the current vulnerability report …

La seguridad subjetiva y el urbanismo participativo en los alrededores del Parque Zonal Sinchi Roca, distrito de Comas

GA Medina Quintana, GJ Melgarejo Rojas - 2022 - repositorio.ucv.edu.pe
Esta investigación plantea como objetivo determinar cómo la seguridad subjetiva influye en
el urbanismo participativo en los alrededores del parque zonal Sinchi Roca. La metodología …