We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Advancing Software Vulnerability Scoring: A Statistical Approach with Machine Learning Techniques and GridSearchCV Parameter Tuning

    The growing complexity, diversity, and importance of software pose a significant threat to computer system security due to exploitable software...

    Birendra Kumar Verma, Ajay Kumar Yadav in SN Computer Science
    Article 28 May 2024
  2. Comprehensive vulnerability aspect extraction

    Extracting valuable information from unstructured vulnerability reports constitutes a fundamental task in numerous cybersecurity applications....

    Qindong Li, Wenyi Tang, ... Lizhi Wang in Applied Intelligence
    Article 08 February 2024
  3. Vulnerability management in Linux distributions

    Vulnerabilities in software systems not only lead to loss of revenue, but also to loss of reputation and trust. To avoid this, software providers...

    Jiahuei Lin, Haoxiang Zhang, ... Ahmed E. Hassan in Empirical Software Engineering
    Article 16 February 2023
  4. Enriching Vulnerability Reports Through Automated and Augmented Description Summarization

    Security incidents and data breaches are increasing rapidly, and only a fraction of them is being reported. Public vulnerability databases, e.g.,...
    Hattan Althebeiti, David Mohaisen in Information Security Applications
    Conference paper 2024
  5. On the coordination of vulnerability fixes

    The Common Vulnerabilities and Exposures (CVE) program is dedicated to analyzing vulnerabilities, then to assigning a unique ID to them and...

    Jiahuei Lin, Bram Adams, Ahmed E. Hassan in Empirical Software Engineering
    Article 10 November 2023
  6. Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases

    Proactive security plays a vital role in preventing the attack before entering active mode. In the modern information environment, it depends on the...

    Gaurav Sharma, Stilianos Vidalis, ... Niharika Anand in Multimedia Tools and Applications
    Article 02 November 2022
  7. Dynamic vulnerability severity calculator for industrial control systems

    The convergence of information and communication technologies has introduced new and advanced capabilities to Industrial Control Systems. However,...

    Pavlos Cheimonidis, Konstantinos Rantos in International Journal of Information Security
    Article 08 May 2024
  8. Vulnerability Assessment and Penetration Testing

    Vulnerability assessment is a comprehensive process aimed at identifying, quantifying, and prioritizing vulnerabilities within a system. This system...
    Dr. Jason Edwards in Mastering Cybersecurity
    Chapter 2024
  9. ProRLearn: boosting prompt tuning-based vulnerability detection by reinforcement learning

    Software vulnerability detection is a critical step in ensuring system security and data protection. Recent research has demonstrated the...

    Zilong Ren, **aolin Ju, ... Hao Shen in Automated Software Engineering
    Article 20 April 2024
  10. Vulnerability Metrics

    Living reference work entry 2024
  11. Entity Alignment Based on Multi-view Interaction Model in Vulnerability Knowledge Graphs

    Entity alignment (EA) aims to match the same entities in different Knowledge Graphs (KGs), which is a critical task in KG fusion. EA has recently...
    ** Jiang, Mohan Li in Web and Big Data
    Conference paper 2024
  12. XSS Vulnerability Test Enhancement for Progressive Web Applications

    Progressive Web Applications produce false negative results when scanned with security vulnerability scanners. In this paper the authors investigate...
    Josep Pegueroles Valles, Sebastien Kanj Bongard, Arnau Estebanell Castellví in Digital Forensics and Cyber Crime
    Conference paper 2024
  13. Identify Vulnerability Types: A Cross-Project Multiclass Vulnerability Classification System Based on Deep Domain Adaptation

    Software Vulnerability Detection(SVD) is a important means to ensure system security due to the ubiquity of software. Deep learning-based approaches...
    Gewangzi Du, Liwei Chen, ... Gang Shi in Neural Information Processing
    Conference paper 2024
  14. A Framework for TLS Implementation Vulnerability Testing in 5G

    A 5G TLS implementation vulnerability testing framework is proposed. By constructing a TLS vulnerability database using the public TLS security...
    Yong Wang, Rui Wang, ... Zhenghao Li in Applied Cryptography and Network Security Workshops
    Conference paper 2023
  15. VulNet: Towards improving vulnerability management in the Maven ecosystem

    Developers rely on software ecosystems such as Maven to manage and reuse external libraries (i.e., dependencies). Due to the complexity of the used...

    Zeyang Ma, Shouvick Mondal, ... Ahmed E. Hassan in Empirical Software Engineering
    Article 05 June 2024
  16. Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data

    When protecting the Industrial Control Systems against cyber attacks, it is important to have as much information as possible to allocate defensive...

    Engla Rencelj Ling, Mathias Ekstedt in SN Computer Science
    Article Open access 08 April 2023
  17. Generating ICS vulnerability playbooks with open standards

    Organizations face attacks on industrial control systems (ICS) as vulnerabilities are pervasive. However, patching vulnerable systems by simply...

    Philip Empl, Daniel Schlette, ... Günther Pernul in International Journal of Information Security
    Article Open access 11 December 2023
  18. Assessing Vulnerability from Its Description

    This paper shows an end-to-end Artificial Intelligence (AI) system to estimate the severity level and the various Common Vulnerability Scoring System...
    Zi**g Zhang, Vimal Kumar, ... Albert Bifet in Ubiquitous Security
    Conference paper 2023
  19. A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics

    The goal of this research is to build a vulnerability prediction model to assist developers in evaluating the security of software systems during the...

    Kazi Zakia Sultana, Charles B. Boyd, Byron J. Williams in SN Computer Science
    Article 09 August 2023
  20. An empirical study of text-based machine learning models for vulnerability detection

    With an increase in complexity and severity, it is becoming harder to identify and mitigate vulnerabilities. Although traditional tools remain...

    Kollin Napier, Tanmay Bhowmik, Shaowei Wang in Empirical Software Engineering
    Article 03 February 2023
Did you find what you were looking for? Share feedback.