Vulnerability Management

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar | Published: 2023-08-03
Cyber Attack
Data Collection
Vulnerability Management

A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection

Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman | Published: 2023-06-29
Scalability Analysis
Network Threat Detection
Vulnerability Management

Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection

Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06
Dataset Generation
Performance Evaluation
Vulnerability Management

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07
Automation of Cybersecurity
Information Gathering Methods
Vulnerability Management

Beware of the Unexpected: Bimodal Taint Analysis

Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25
Software Security
Program Analysis
Vulnerability Management

Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19
Poisoning
Membership Inference
Vulnerability Management

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29
Cyber Threat
Software Security
Vulnerability Management

xFuzz: Machine Learning Guided Cross-Contract Fuzzing

Authors: Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao | Published: 2021-11-24 | Updated: 2022-06-30
Smart Contract
Vulnerability Management
Static Analysis

Social Media Monitoring for IoT Cyber-Threats

Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09
Algorithm
Cybersecurity
Vulnerability Management

Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics

Authors: Tamás Viszkok, Péter Hegedűs, Rudolf Ferenc | Published: 2021-05-16
Class Imbalance
Model Selection
Vulnerability Management