A survey of information security incident handling in the cloud
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …
A Survey on Software Vulnerability Exploitability Assessment
S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …
Security trend analysis with cve topic models
S Neuhaus, T Zimmermann - 2010 IEEE 21st International …, 2010 - ieeexplore.ieee.org
We study the vulnerability reports in the Common Vulnerability and Exposures (CVE)
database by using topic models on their description texts to find prevalent vulnerability types …
database by using topic models on their description texts to find prevalent vulnerability types …
[ΒΙΒΛΙΟ][B] The art and science of analyzing software data
The Art and Science of Analyzing Software Data provides valuable information on analysis
techniques often used to derive insight from software data. This book shares best practices …
techniques often used to derive insight from software data. This book shares best practices …
A cyber-physical power system risk assessment model against cyberattacks
K Yan, X Liu, Y Lu, F Qin - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
With the integration of cyber devices into power systems, such as information
communication technology devices and intelligent electronic devices, there are currently a …
communication technology devices and intelligent electronic devices, there are currently a …
Empirical analysis of system-level vulnerability metrics through actual attacks
The Common Vulnerability Scoring System (CVSS) is a widely used and well-established
standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities …
standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities …
CAVP: A context-aware vulnerability prioritization model
With the growing number of vulnerabilities while attacks are becoming more advanced,
known software security vulnerabilities need to be managed more efficiently with …
known software security vulnerabilities need to be managed more efficiently with …
Software vulnerability prioritization using vulnerability description
Whenever a vulnerability is detected by the testing team, it is described based on its
characteristics and a detailed overview of the vulnerability is given by the testing team …
characteristics and a detailed overview of the vulnerability is given by the testing team …
Vulnerability management models using a common vulnerability scoring system
Featured Application The Vulnerability Management Center allows for the improvement of
the quality and efficiency of operation for security operation centers. Abstract Vulnerability …
the quality and efficiency of operation for security operation centers. Abstract Vulnerability …
[HTML][HTML] A cyber risk prediction model using common vulnerabilities and exposures
The cyber risk from malicious external attackers is a significant socio-economic problem.
Cyber risk prediction is particularly difficult, given the constantly changing attack vectors …
Cyber risk prediction is particularly difficult, given the constantly changing attack vectors …