2015
DOI: 10.1007/978-3-319-17040-4_24
|View full text |Cite
|
Sign up to set email alerts
|

Automated Extraction of Vulnerability Information for Home Computer Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(25 citation statements)
references
References 10 publications
0
25
0
Order By: Relevance
“…Mittal et al [1] analyze tweets about cybersecurity and issue timely threat alerts to security analysts. Weerawardhana et al [27] present machine learning-based and part-of-speech tagging approaches to information extraction from online vulnerability databases. Bridges et al [22] propose a Maximum Entropy Model trained with the many security corpus and achieve a high performance of identification and classification of appropriate entities.…”
Section: B Machine Learning-based Entity Extraction Methodsmentioning
confidence: 99%
“…Mittal et al [1] analyze tweets about cybersecurity and issue timely threat alerts to security analysts. Weerawardhana et al [27] present machine learning-based and part-of-speech tagging approaches to information extraction from online vulnerability databases. Bridges et al [22] propose a Maximum Entropy Model trained with the many security corpus and achieve a high performance of identification and classification of appropriate entities.…”
Section: B Machine Learning-based Entity Extraction Methodsmentioning
confidence: 99%
“…Few documents from the last three years can be found on the subject of NER in information security. A small number of works have focused on extracting vulnerabilities and attack information from unstructured texts in the past few years [11][12][13][14]. Bridges et al proposed a maximum entropy model trained with an averaged perceptron to extract entities from text, but these authors extracted only the entities and did not classify the types of these entities [11].…”
Section: Related Workmentioning
confidence: 99%
“…Bridges et al proposed a maximum entropy model trained with an averaged perceptron to extract entities from text, but these authors extracted only the entities and did not classify the types of these entities [11]. Weerawardhana et al extracted vulnerability information from an online vulnerability database [12]. Lal proposed a CRF to extract vulnerabilities from the text [13].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Mittal et al [1] analyzed tweets related to cybersecurity and issued timely threat alerts to security analysts. Weerawardhana et al [2] proposed a model that extracts information from online vulnerability databases, such as the Common Vulnerabilities and Exposures (CVE) list and the National Vulnerability Database. However, these resources focus on data from just one source.…”
Section: Introductionmentioning
confidence: 99%