Search
Search Results
-
Collaborative Virtual Environment for Distant and Blended Learning in the Higher Education Setting: A Systematic Review
Collaborative virtual environment (CVE) is a set of technologies that enable collaborative activities in virtual scenarios while users can... -
Extended Abstract: Assessing Language Models for Semantic Textual Similarity in Cybersecurity
In light of the significant strides made by large language models (LLMs) in the field of natural language processing (NLP) [5], our research seeks to... -
The Design and Application of a Unified Ontology for Cyber Security
Ontology enables semantic interoperability, making it highly valuable for cyber threat hunting. Community-driven frameworks like MITRE ATT &CK,... -
A Similarity Approach for the Classification of Mitigations in Public Cybersecurity Repositories into NIST-SP 800-53 Catalog
By 2025, it is projected that cybercrimes will escalate to an alarming annual figure of 10.5 trillion USD. To counter this growing threat,... -
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases
Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the...
-
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network
Cyber threat intelligence (CTI) refers to essential knowledge used by organizations to prevent or mitigate against cyber attacks. Vulnerability...
-
Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
Security incidents and data breaches are increasing rapidly, and only a fraction of them is being reported. Public vulnerability databases, e.g.,... -
Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports
At present, the vulnerability database research has mainly focused on whether the disclosed information is accurate. However, the information... -
Comparing ML-Based Predictions and Static Analyzer Tools for Vulnerability Detection
Finding and eliminating security issues early in the development process is critical as software systems are sha** many aspects of our daily lives.... -
Longitudinal Study of Internet-Facing OpenSSH Update Patterns
Kee** server software patched and up-to-date is a never-ending struggle for system administrators that is crucial for security. Nevertheless, we... -
vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability
Vulnerable kernel codes are a threat to an operating system kernel. An adversary’s user process can forcefully invoke a vulnerable kernel code to... -
The Efficiency of Augmented Pointing with and Without Speech in a Collaborative Virtual Environment
Pointing is a ubiquitous part of human communication. However, pointing gestures to distal referents are often misunderstood systematically, which... -
Jeu de mots paronomasia: a StackOverflow-driven bug discovery approach
Locating bug code snippets (short for BugCode) has been a complex problem throughout the history of software security, mainly because the constraints...
-
An Efficient Use-after-Free Mitigation Approach via Static Dangling Pointer Nullification
UAF (use-after-free) is one of the most severe program vulnerabilities, caused by dangling pointers. Existing vulnerability mitigation approaches... -
Evaluating Models with Dynamic Sampling Holdout
Automated Machine Learning (Auto-ML) is a growing field where several techniques are being developed to address the question of how to automate the... -
Collaborative Virtual Environment to Encourage Teamwork in Autistic Adults in Workplace Settings
The employment settings for autistic individuals in the USA is grim. As more children are diagnosed with ASD, the number of adolescent and young... -
Containers’ Privacy and Data Protection via Runtime Scanning Methods
Docker containers’ privacy and data protection is a critical issue. Unfortunately, existing works overlook runtime scanning methods. This paper... -
Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting
Software containers provide a light-weight counterpart to virtual machines, utilizing the native host operating system to efficiently manage... -
Dynamic vulnerability severity calculator for industrial control systems
The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However,...
-
MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels
Allocation, dereferencing, and freeing of memory data in kernels are coherently linked. There widely exist real cases where the correctness of memory...