To fear or not to fear that is the question: Code characteristics of a vulnerable functionwith an existing exploit

A Younis, Y Malaiya, C Anderson, I Ray - … of the sixth ACM conference on …, 2016 - dl.acm.org
Not all vulnerabilities are equal. Some recent studies have shown that only a small fraction
of vulnerabilities that have been reported has actually been exploited. Since finding and …

Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability

AA Younis, YK Malaiya, I Ray - 2014 IEEE 15th International …, 2014 - ieeexplore.ieee.org
An unpatched vulnerability can lead to security breaches. When a new vulnerability is
discovered, it needs to be assessed so that it can be prioritized. A major challenge in …

Comparing and evaluating CVSS base metrics and microsoft rating system

AA Younis, YK Malaiya - 2015 IEEE International Conference …, 2015 - ieeexplore.ieee.org
Evaluating the accuracy of vulnerability security risk metrics is important because incorrectly
assessing a vulnerability to be more critical could lead to a waste of limited resources …

The work‐averse cyberattacker model: theory and evidence from two million attack signatures

L Allodi, F Massacci, J Williams - Risk Analysis, 2022 - Wiley Online Library
The assumption that a cyberattacker will potentially exploit all present vulnerabilities drives
most modern cyber risk management practices and the corresponding security investments …

Using software structure to predict vulnerability exploitation potential

AA Younis, YK Malaiya - 2014 IEEE Eighth International …, 2014 - ieeexplore.ieee.org
Most of the attacks on computer systems are due to the presence of vulnerabilities in
software. Recent trends show that number of newly discovered vulnerabilities still continue …

PatchRank: Ordering updates for SCADA systems

G Yadav, K Paul - 2019 24th IEEE International Conference on …, 2019 - ieeexplore.ieee.org
Securing SCADA is a challenging task for the research community as well as the industry.
SCADA networks form the basis of industrial productivity. Industry 4.0 is likely to see more …

A game theoretic approach to vulnerability patching

G Gianini, M Cremonini, A Rainini… - … on Information and …, 2015 - ieeexplore.ieee.org
Patching vulnerabilities is one of the key activities in security management. For most
commercial systems however the number of relevant vulnerabilities is very high; as a …

On the application of algebraic graph theory to modeling network intrusions

C Easttom - 2020 10th Annual Computing and Communication …, 2020 - ieeexplore.ieee.org
Graph theory is a well-established method for modeling a wide range of connected systems.
It has been applied to modeling computer networks, neurological systems, social …

A pso-based web document classification algorithm

Z Wang, Q Zhang, D Zhang - Eighth ACIS International …, 2007 - ieeexplore.ieee.org
Due to the exponential growth of documents in the Internet and the emergent need to
organize them, the automatic document classification has received an ever-increased …

Applying mathematics and engineering techniques to cyber security

C Easttom - Actas del Congreso Internacional de Ingeniería …, 2021 - revistas.ulima.edu.pe
Si bien existen muchos enfoques de la ciberseguridad, es común que esos enfoques sean
al menos algo ad hoc o subjetivos. La ciberseguridad necesita un riguroso enfoque …