CySecBERT: A Domain-Adapted Language Model for the Cybersecurity Domain

M Bayer, P Kuehn, R Shanehsaz… - ACM Transactions on …, 2024 - dl.acm.org
The field of cysec is evolving fast. Security professionals are in need of intelligence on past,
current and—ideally—upcoming threats, because attacks are becoming more advanced and …

[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence

E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …

Study of word embeddings for enhanced cyber security named entity recognition

S Srivastava, B Paul, D Gupta - Procedia Computer Science, 2023 - Elsevier
A vast majority of cyber security information is in the form of unstructured text. A much-
needed task is to have a machine-assisted analysis of such information. Named Entity …

[PDF][PDF] Research on sql injection attacks using word embedding techniques and machine learning

S Venkatramulu, MS Waseem, A Taneem… - Journal of Sensors …, 2024 - fringeglobal.com
Most of the damage done by web application attacks comes from SQL injection attacks, in
which the attacker (s) can change, remove, and read data from the database servers. All …

Kgsecconfig: a knowledge graph based approach for secured container orchestrator configuration

MU Haque, MM Kholoosi… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Container Orchestrator (CO) is a vital technology for managing clusters of containers, which
may form a virtualized infrastructure for developing and operating software systems. Like …

AutoPwn: Artifact-assisted Heap Exploit Generation for CTF PWN Competitions

D Xu, K Chen, M Lin, C Lin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Capture-the-flag (CTF) competitions have become highly successful in security education,
and heap corruption is considered one of the most difficult and rewarding challenges due to …

[HTML][HTML] BVTED: A Specialized Bilingual (Chinese–English) Dataset for Vulnerability Triple Extraction Tasks

K Liu, Y Wang, Z Ding, A Li, W Zhang - Applied Sciences, 2024 - mdpi.com
Extracting knowledge from cyber threat intelligence is essential for understanding cyber
threats and implementing proactive defense measures. However, there is a lack of open …

Scout-bot: Leveraging API community knowledge for exploration and discovery of API learning resources

G Ajam, C Rodriguez, B Benatallah - CLEI electronic journal, 2021 - clei.org
Abstract Application Programming Interface (API) is a core technology that facilitates
developers' productivity by enabling the reuse of software components. Understanding APIs …

An automated post-mortem analysis of vulnerability relationships using natural language word embeddings

BS Meyers, A Meneely - Procedia Computer Science, 2021 - Elsevier
The daily activities of cybersecurity experts and software engineers—code reviews, issue
tracking, vulnerability reporting—are constantly contributing to a massive wealth of security …

Generating attack–defense tree by automatically retrieving domain-specific security attack patterns

M Aijaz, M Nazir, MN Anwar - Artificial Intelligence and Sustainable …, 2022 - Springer
With the rapid integration of different technologies such as IoT, cloud computing, and big
data in complex and safety-critical systems, security attacks have become a common …