We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 2,514 results
  1. Collaborative Virtual Environment for Distant and Blended Learning in the Higher Education Setting: A Systematic Review

    Collaborative virtual environment (CVE) is a set of technologies that enable collaborative activities in virtual scenarios while users can...
    Conference paper 2022
  2. Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity

    In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to...
    Arian Soltani, DJeff Kanda Nkashama, ... Froduald Kabanza in Detection of Intrusions and Malware, and Vulnerability Assessment
    Conference paper 2024
  3. The Design and Application of a Unified Ontology for Cyber Security

    Ontology enables semantic interoperability, making it highly valuable for cyber threat hunting. Community-driven frameworks like MITRE ATT &CK,...
    Khandakar Ashrafi Akbar, Fariha Ishrat Rahman, ... Bhavani Thuraisingham in Information Systems Security
    Conference paper 2023
  4. A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog

    By 2025, it is projected that cybercrimes will escalate to an alarming annual figure of 10.5 trillion USD. To counter this growing threat,...
    Ahmed Elmarkez, Soraya Mesli-Kesraoui, ... Djamal Kesraoui in Information Security Theory and Practice
    Conference paper 2024
  5. Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases

    Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the...

    Gaurav Sharma, Stilianos Vidalis, ... Niharika Anand in Multimedia Tools and Applications
    Article 02 November 2022
  6. A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network

    Cyber threat intelligence (CTI) refers to essential knowledge used by organizations to prevent or mitigate against cyber attacks. Vulnerability...

    P. R. Vishnu, P. Vinod, Suleiman Y. Yerima in Journal of Network and Systems Management
    Article 08 October 2021
  7. Enriching Vulnerability Reports Through Automated and Augmented Description Summarization

    Security incidents and data breaches are increasing rapidly, and only a fraction of them is being reported. Public vulnerability databases, e.g.,...
    Hattan Althebeiti, David Mohaisen in Information Security Applications
    Conference paper 2024
  8. Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports

    At present, the vulnerability database research has mainly focused on whether the disclosed information is accurate. However, the information...
    Hansong Ren, Xuejun Li, ... Yuqing Zhang in Frontiers in Cyber Security
    Conference paper 2022
  9. Comparing ML-Based Predictions and Static Analyzer Tools for Vulnerability Detection

    Finding and eliminating security issues early in the development process is critical as software systems are sha** many aspects of our daily lives....
    Norbert Vándor, Balázs Mosolygó, Péter Hegelűs in Computational Science and Its Applications – ICCSA 2022 Workshops
    Conference paper 2022
  10. Longitudinal Study of Internet-Facing OpenSSH Update Patterns

    Kee** server software patched and up-to-date is a never-ending struggle for system administrators that is crucial for security. Nevertheless, we...
    Jonathan Codi West, Tyler Moore in Passive and Active Measurement
    Conference paper 2022
  11. vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability

    Vulnerable kernel codes are a threat to an operating system kernel. An adversary’s user process can forcefully invoke a vulnerable kernel code to...
    Hiroki Kuzuno, Toshihiro Yamauchi in Information Security Applications
    Conference paper 2023
  12. The Efficiency of Augmented Pointing with and Without Speech in a Collaborative Virtual Environment

    Pointing is a ubiquitous part of human communication. However, pointing gestures to distal referents are often misunderstood systematically, which...
    Conference paper 2023
  13. Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach

    Locating bug code snippets (short for BugCode) has been a complex problem throughout the history of software security, mainly because the constraints...

    Yi Yang, Ying Li, ... **ghua Liu in Cybersecurity
    Article Open access 03 April 2023
  14. An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification

    UAF (use-after-free) is one of the most severe program vulnerabilities, caused by dangling pointers. Existing vulnerability mitigation approaches...
    Yue Yu, **aoqi Jia, ... Shengzhi Zhang in ICT Systems Security and Privacy Protection
    Conference paper 2022
  15. Evaluating Models with Dynamic Sampling Holdout

    Automated Machine Learning (Auto-ML) is a growing field where several techniques are being developed to address the question of how to automate the...
    Celio H. N. Larcher, Helio J. C. Barbosa in Applications of Evolutionary Computation
    Conference paper 2021
  16. Collaborative Virtual Environment to Encourage Teamwork in Autistic Adults in Workplace Settings

    The employment settings for autistic individuals in the USA is grim. As more children are diagnosed with ASD, the number of adolescent and young...
    Ashwaq Zaini Amat, Michael Breen, ... Nilanjan Sarkar in Universal Access in Human-Computer Interaction. Design Methods and User Experience
    Conference paper 2021
  17. Containers’ Privacy and Data Protection via Runtime Scanning Methods

    Docker containers’ privacy and data protection is a critical issue. Unfortunately, existing works overlook runtime scanning methods. This paper...
    Conference paper 2022
  18. Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting

    Software containers provide a light-weight counterpart to virtual machines, utilizing the native host operating system to efficiently manage...
    Novak Boskov, Naor Radami, ... Ari Trachtenberg in Cyber Security, Cryptology, and Machine Learning
    Conference paper 2022
  19. Dynamic vulnerability severity calculator for industrial control systems

    The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However,...

    Pavlos Cheimonidis, Konstantinos Rantos in International Journal of Information Security
    Article 08 May 2024
  20. MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels

    Allocation, dereferencing, and freeing of memory data in kernels are coherently linked. There widely exist real cases where the correctness of memory...

    Gen Zhang, Peng-Fei Wang, ... Kai Lu in Journal of Computer Science and Technology
    Article 30 November 2021
Did you find what you were looking for? Share feedback.