A survey of information security incident handling in the cloud

NH Ab Rahman, KKR Choo - computers & security, 2015 - Elsevier
Incident handling strategy is one key strategy to mitigate risks to the confidentiality, integrity
and availability (CIA) of organisation assets, as well as minimising loss (eg financial …

A Survey on Software Vulnerability Exploitability Assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

Security trend analysis with cve topic models

S Neuhaus, T Zimmermann - 2010 IEEE 21st International …, 2010 - ieeexplore.ieee.org
We study the vulnerability reports in the Common Vulnerability and Exposures (CVE)
database by using topic models on their description texts to find prevalent vulnerability types …

[ΒΙΒΛΙΟ][B] The art and science of analyzing software data

C Bird, T Menzies, T Zimmermann - 2015 - books.google.com
The Art and Science of Analyzing Software Data provides valuable information on analysis
techniques often used to derive insight from software data. This book shares best practices …

A cyber-physical power system risk assessment model against cyberattacks

K Yan, X Liu, Y Lu, F Qin - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
With the integration of cyber devices into power systems, such as information
communication technology devices and intelligent electronic devices, there are currently a …

Empirical analysis of system-level vulnerability metrics through actual attacks

H Holm, M Ekstedt, D Andersson - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The Common Vulnerability Scoring System (CVSS) is a widely used and well-established
standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities …

CAVP: A context-aware vulnerability prioritization model

B Jung, Y Li, T Bechor - Computers & Security, 2022 - Elsevier
With the growing number of vulnerabilities while attacks are becoming more advanced,
known software security vulnerabilities need to be managed more efficiently with …

Software vulnerability prioritization using vulnerability description

R Sharma, R Sibal, S Sabharwal - International Journal of System …, 2021 - Springer
Whenever a vulnerability is detected by the testing team, it is described based on its
characteristics and a detailed overview of the vulnerability is given by the testing team …

Vulnerability management models using a common vulnerability scoring system

M Walkowski, J Oko, S Sujecki - Applied Sciences, 2021 - mdpi.com
Featured Application The Vulnerability Management Center allows for the improvement of
the quality and efficiency of operation for security operation centers. Abstract Vulnerability …

[HTML][HTML] A cyber risk prediction model using common vulnerabilities and exposures

AN Kia, F Murphy, B Sheehan, D Shannon - Expert Systems with …, 2024 - Elsevier
The cyber risk from malicious external attackers is a significant socio-economic problem.
Cyber risk prediction is particularly difficult, given the constantly changing attack vectors …