Not the end of story: An evaluation of ChatGPT-driven vulnerability description map**s
As the number of vulnerabilities increases day by day, security management requires more
and more structured data. In addition to textual descriptions of vulnerabilities, security …
and more structured data. In addition to textual descriptions of vulnerabilities, security …
Analysis of Cyber-Intelligence Frameworks for AI Data Processing
A Sánchez del Monte, L Hernández-Álvarez - Applied Sciences, 2023 - mdpi.com
This paper deals with the concept of cyber intelligence and its components as a fundamental
tool for the protection of information today. After that, the main cyber-intelligence frameworks …
tool for the protection of information today. After that, the main cyber-intelligence frameworks …
[PDF][PDF] Different machine learning algorithms used for secure software advance using software repositories
K Chaudhary, DS Singh - … Journal of Scientific Research in Computer …, 2023 - academia.edu
In the present phase of the Fourth Industrial Revolution (4IR or Industry 4.0), the digital world
has a wealth of data, such as Internet of Things (IoT) data, cybersecurity data, mobile data …
has a wealth of data, such as Internet of Things (IoT) data, cybersecurity data, mobile data …
Sentence embedding and fine-tuning to automatically identify duplicate bugs
Industrial software maintenance is critical but burdensome. Activities such as detecting
duplicate bug reports are often performed manually. Herein an automated duplicate bug …
duplicate bug reports are often performed manually. Herein an automated duplicate bug …
Beyond the Surface: An NLP-based Methodology to Automatically Estimate CVE Relevance for CAPEC Attack Patterns
Threat analysis is continuously growing in importance due to the always-increasing
complexity and frequency of cyber attacks. Analyzing threats demands significant effort from …
complexity and frequency of cyber attacks. Analyzing threats demands significant effort from …
SecKG2vec: A novel security knowledge graph relational reasoning method based on semantic and structural fusion embedding
X Liu, X Guo, W Gu - Computers & Security, 2025 - Elsevier
Abstract Knowledge graph technology is widely used in network security design, analysis,
and detection. By collecting, organizing, and mining various security knowledge, it provides …
and detection. By collecting, organizing, and mining various security knowledge, it provides …
Identifying patterns in common vulnerabilities and exposures databases with exploratory data analysis
Cybersecurity threats are targeted by unauthorized users for data stealing, manipulation,
harming the reputation of another organization, and damaging the information system. A …
harming the reputation of another organization, and damaging the information system. A …
The Impact of Large Language Models on IT Security in the Corporate Environment
S Scholz, A Lawall, K Schaaff - 2024 2nd International …, 2024 - ieeexplore.ieee.org
This paper investigates the impact of Large Language Models (LLMs) on both offensive and
defensive aspects of IT security within corporate environments. Addressing the fragmented …
defensive aspects of IT security within corporate environments. Addressing the fragmented …
[HTML][HTML] Text Command Intelligent Understanding for Cybersecurity Testing
J Yi, Y Liu, Z Jiang, Z Liu - Electronics, 2024 - mdpi.com
Research on named entity recognition (NER) and command-line generation for network
security evaluation tools is relatively scarce, and no mature models for recognition or …
security evaluation tools is relatively scarce, and no mature models for recognition or …
[PDF][PDF] Sourcing language models and text information for inferring cyber threat, vulnerability and mitigation relationships
E Hemberg, A Srinivasan, N Rutar… - AI4Cyber/MLHat: AI …, 2022 - ai4cyber-kdd.com
We inquire into what cyber threat, vulnerability and mitigation text sources best support
inference of relational links between entries in the text sources. Our goal is to use the free …
inference of relational links between entries in the text sources. Our goal is to use the free …