Alert Prioritisation in Security Operations Centres: A Systematic Survey on Criteria and Methods

F Jalalvand, M Baruwal Chhetri, S Nepal… - ACM Computing …, 2024 - dl.acm.org
Security Operations Centres (SOCs) are specialised facilities where security analysts
leverage advanced technologies to monitor, detect and respond to cyber incidents …

EU space security–An 8-Step online discourse analysis to decode hybrid threats

J Reis - Plos one, 2024 - journals.plos.org
Space security has emerged as a concern for the European Union (EU), given that space
systems have become integral to ensuring the safety of all European society. This strategy …

On the uses of large language models to interpret ambiguous cyberattack descriptions

R Fayyazi, SJ Yang - arXiv preprint arXiv:2306.14062, 2023 - arxiv.org
The volume, variety, and velocity of change in vulnerabilities and exploits have made
incident threat analysis challenging with human expertise and experience along. The MITRE …

XLNet-based prediction model for CVSS metric values

F Shi, S Kai, J Zheng, Y Zhong - Applied Sciences, 2022 - mdpi.com
A plethora of software vulnerabilities are exposed daily, posing a severe threat to the
Internet. It is almost impossible for security experts or software developers to deal with all …

[HTML][HTML] Helping CNAs Generate CVSS Scores Faster and More Confidently Using XAI

E Manai, M Mejri, J Fattahi - Applied Sciences, 2024 - mdpi.com
The number of cybersecurity vulnerabilities keeps growing every year. Each vulnerability
must be reported to the MITRE Corporation and assessed by a Counting Number Authority …

Comprehensive vulnerability aspect extraction

Q Li, W Tang, X Chen, S Feng, L Wang - Applied Intelligence, 2024 - Springer
Extracting valuable information from unstructured vulnerability reports constitutes a
fundamental task in numerous cybersecurity applications. Existing approaches necessitate …

How to Squeeze An Explanation Out of Your Model

T Roxo, JC Costa, PRM Inácio, H Proença - arXiv preprint arXiv …, 2024 - arxiv.org
Deep learning models are widely used nowadays for their reliability in performing various
tasks. However, they do not typically provide the reasoning behind their decision, which is a …

CVE Severity Prediction From Vulnerability Description-A Deep Learning Approach

A Manjunatha, K Kota, AS Babu - Procedia Computer Science, 2024 - Elsevier
Abstract The Common Vulnerabilities and Exposures (CVE) system is a widely used
standard for identifying and tracking known vulnerabilities in software systems. The severity …

Reciprocating Encoder portrayal from reliable Transformer dependent Bidirectional Long Short-Term Memory for Question and Answering Text Classification

KSS Prabha, M Suguna - IEEE Access, 2024 - ieeexplore.ieee.org
Diversity in use of Question and Answering (Q/A) is evolving as a popular application in the
area of Natural Language Processing (NLP). The alive unsupervised word embedding …

The Flaw Within: Identifying CVSS Score Discrepancies in the NVD

S Zhang, M Cai, M Zhang, L Zhao… - … on Cloud Computing …, 2023 - ieeexplore.ieee.org
Cloud security frameworks, like OpenSCAP, rely on vulnerability databases such as the
National Vulnerability Database (NVD) to assess threats, ensure compliance, and manage …