Recent progress of using knowledge graph for cybersecurity
In today's dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk
of cyberattacks are both increasing. This means that organizations need to have a strong …
of cyberattacks are both increasing. This means that organizations need to have a strong …
A review of knowledge graph application scenarios in cyber security
Facing the dynamic complex cyber environments, internal and external cyber threat
intelligence, and the increasing risk of cyber-attack, knowledge graphs show great …
intelligence, and the increasing risk of cyber-attack, knowledge graphs show great …
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description
Thousands of software vulnerabilities are archived and disclosed to the public each year,
posing severe cybersecurity threats to the whole society. Predicting the exploitability of …
posing severe cybersecurity threats to the whole society. Predicting the exploitability of …
A multi-target approach to estimate software vulnerability characteristics and severity scores
Software vulnerabilities constitute a great risk for the IT community. The specification of the
vulnerability characteristics is a crucial procedure, since the characteristics are used as input …
vulnerability characteristics is a crucial procedure, since the characteristics are used as input …
Predicting vulnerability type in common vulnerabilities and exposures (cve) database with machine learning classifiers
Vulnerability type is not part of the standard CVE scheme so the ability to determine it only
on the basis of text description would be a very useful for automated vulnerability handling …
on the basis of text description would be a very useful for automated vulnerability handling …
Common vulnerability scoring system prediction based on open source intelligence information sources
The number of newly published vulnerabilities is constantly increasing. Until now, the
information available when a new vulnerability is published is manually assessed by experts …
information available when a new vulnerability is published is manually assessed by experts …
The functional safety assessment of cyber-physical system operation process described by Markov chain
The functional safety assessment is one of the primary tasks both at the design stage and at
the stage of operation of critical infrastructure at all levels. The article's main contribution is …
the stage of operation of critical infrastructure at all levels. The article's main contribution is …
[HTML][HTML] A selective ensemble model for cognitive cybersecurity analysis
Dynamic data-driven vulnerability assessments face massive heterogeneous data contained
in, and produced by SOCs (Security Operations Centres). Manual vulnerability assessment …
in, and produced by SOCs (Security Operations Centres). Manual vulnerability assessment …
A large-scale security-oriented static analysis of python packages in PyPI
Different security issues are a common problem for open source packages archived to and
delivered through software ecosystems. These often manifest themselves as software …
delivered through software ecosystems. These often manifest themselves as software …
A real-time dynamic concept adaptive learning algorithm for exploitability prediction
Exploitability prediction has become increasingly important in cybersecurity, as the number
of disclosed software vulnerabilities and exploits are soaring. Recently, machine learning …
of disclosed software vulnerabilities and exploits are soaring. Recently, machine learning …