Not the end of story: An evaluation of ChatGPT-driven vulnerability description map**s

X Liu, Y Tan, Z **ao, J Zhuge… - Findings of the Association …, 2023 - aclanthology.org
As the number of vulnerabilities increases day by day, security management requires more
and more structured data. In addition to textual descriptions of vulnerabilities, security …

Analysis of Cyber-Intelligence Frameworks for AI Data Processing

A Sánchez del Monte, L Hernández-Álvarez - Applied Sciences, 2023 - mdpi.com
This paper deals with the concept of cyber intelligence and its components as a fundamental
tool for the protection of information today. After that, the main cyber-intelligence frameworks …

[PDF][PDF] Different machine learning algorithms used for secure software advance using software repositories

K Chaudhary, DS Singh - … Journal of Scientific Research in Computer …, 2023 - academia.edu
In the present phase of the Fourth Industrial Revolution (4IR or Industry 4.0), the digital world
has a wealth of data, such as Internet of Things (IoT) data, cybersecurity data, mobile data …

Sentence embedding and fine-tuning to automatically identify duplicate bugs

H Isotani, H Washizaki, Y Fukazawa… - Frontiers in Computer …, 2023 - frontiersin.org
Industrial software maintenance is critical but burdensome. Activities such as detecting
duplicate bug reports are often performed manually. Herein an automated duplicate bug …

Beyond the Surface: An NLP-based Methodology to Automatically Estimate CVE Relevance for CAPEC Attack Patterns

S Bonomi, A Ciavotta, S Lenti, A Palma - arxiv preprint arxiv:2501.07131, 2025 - arxiv.org
Threat analysis is continuously growing in importance due to the always-increasing
complexity and frequency of cyber attacks. Analyzing threats demands significant effort from …

SecKG2vec: A novel security knowledge graph relational reasoning method based on semantic and structural fusion embedding

X Liu, X Guo, W Gu - Computers & Security, 2025 - Elsevier
Abstract Knowledge graph technology is widely used in network security design, analysis,
and detection. By collecting, organizing, and mining various security knowledge, it provides …

Identifying patterns in common vulnerabilities and exposures databases with exploratory data analysis

A Kumar, I Sharma - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Cybersecurity threats are targeted by unauthorized users for data stealing, manipulation,
harming the reputation of another organization, and damaging the information system. A …

The Impact of Large Language Models on IT Security in the Corporate Environment

S Scholz, A Lawall, K Schaaff - 2024 2nd International …, 2024 - ieeexplore.ieee.org
This paper investigates the impact of Large Language Models (LLMs) on both offensive and
defensive aspects of IT security within corporate environments. Addressing the fragmented …

[HTML][HTML] Text Command Intelligent Understanding for Cybersecurity Testing

J Yi, Y Liu, Z Jiang, Z Liu - Electronics, 2024 - mdpi.com
Research on named entity recognition (NER) and command-line generation for network
security evaluation tools is relatively scarce, and no mature models for recognition or …

[PDF][PDF] Sourcing language models and text information for inferring cyber threat, vulnerability and mitigation relationships

E Hemberg, A Srinivasan, N Rutar… - AI4Cyber/MLHat: AI …, 2022 - ai4cyber-kdd.com
We inquire into what cyber threat, vulnerability and mitigation text sources best support
inference of relational links between entries in the text sources. Our goal is to use the free …