Alert Prioritisation in Security Operations Centres: A Systematic Survey on Criteria and Methods
F Jalalvand, M Baruwal Chhetri, S Nepal… - ACM Computing …, 2024 - dl.acm.org
Security Operations Centres (SOCs) are specialised facilities where security analysts
leverage advanced technologies to monitor, detect and respond to cyber incidents …
leverage advanced technologies to monitor, detect and respond to cyber incidents …
EU space security–An 8-Step online discourse analysis to decode hybrid threats
J Reis - Plos one, 2024 - journals.plos.org
Space security has emerged as a concern for the European Union (EU), given that space
systems have become integral to ensuring the safety of all European society. This strategy …
systems have become integral to ensuring the safety of all European society. This strategy …
On the uses of large language models to interpret ambiguous cyberattack descriptions
The volume, variety, and velocity of change in vulnerabilities and exploits have made
incident threat analysis challenging with human expertise and experience along. The MITRE …
incident threat analysis challenging with human expertise and experience along. The MITRE …
XLNet-based prediction model for CVSS metric values
F Shi, S Kai, J Zheng, Y Zhong - Applied Sciences, 2022 - mdpi.com
A plethora of software vulnerabilities are exposed daily, posing a severe threat to the
Internet. It is almost impossible for security experts or software developers to deal with all …
Internet. It is almost impossible for security experts or software developers to deal with all …
[HTML][HTML] Helping CNAs Generate CVSS Scores Faster and More Confidently Using XAI
The number of cybersecurity vulnerabilities keeps growing every year. Each vulnerability
must be reported to the MITRE Corporation and assessed by a Counting Number Authority …
must be reported to the MITRE Corporation and assessed by a Counting Number Authority …
Comprehensive vulnerability aspect extraction
Q Li, W Tang, X Chen, S Feng, L Wang - Applied Intelligence, 2024 - Springer
Extracting valuable information from unstructured vulnerability reports constitutes a
fundamental task in numerous cybersecurity applications. Existing approaches necessitate …
fundamental task in numerous cybersecurity applications. Existing approaches necessitate …
How to Squeeze An Explanation Out of Your Model
Deep learning models are widely used nowadays for their reliability in performing various
tasks. However, they do not typically provide the reasoning behind their decision, which is a …
tasks. However, they do not typically provide the reasoning behind their decision, which is a …
CVE Severity Prediction From Vulnerability Description-A Deep Learning Approach
A Manjunatha, K Kota, AS Babu - Procedia Computer Science, 2024 - Elsevier
Abstract The Common Vulnerabilities and Exposures (CVE) system is a widely used
standard for identifying and tracking known vulnerabilities in software systems. The severity …
standard for identifying and tracking known vulnerabilities in software systems. The severity …
Reciprocating Encoder portrayal from reliable Transformer dependent Bidirectional Long Short-Term Memory for Question and Answering Text Classification
KSS Prabha, M Suguna - IEEE Access, 2024 - ieeexplore.ieee.org
Diversity in use of Question and Answering (Q/A) is evolving as a popular application in the
area of Natural Language Processing (NLP). The alive unsupervised word embedding …
area of Natural Language Processing (NLP). The alive unsupervised word embedding …
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD
Cloud security frameworks, like OpenSCAP, rely on vulnerability databases such as the
National Vulnerability Database (NVD) to assess threats, ensure compliance, and manage …
National Vulnerability Database (NVD) to assess threats, ensure compliance, and manage …