2009 3rd International Symposium on Empirical Software Engineering and Measurement 2009
DOI: 10.1109/esem.2009.5314230
|View full text |Cite
|
Sign up to set email alerts
|

Improving CVSS-based vulnerability prioritization and response with context information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 83 publications
(37 citation statements)
references
References 22 publications
0
36
0
1
Order By: Relevance
“…Dispersion [2] includes the distinguishing degree and the distribution of the results assessed. There are a lot of researches on the objectivity of CVSS [3][4][5][6]. However, there are few researches on the dispersion.…”
Section: Dear Editormentioning
confidence: 99%
See 1 more Smart Citation
“…Dispersion [2] includes the distinguishing degree and the distribution of the results assessed. There are a lot of researches on the objectivity of CVSS [3][4][5][6]. However, there are few researches on the dispersion.…”
Section: Dear Editormentioning
confidence: 99%
“…Calculate risk score. Put values of impact and exploitability into (1) and (4) to calculate a risk score. Both CVSS and CVSS PCA performs this step.…”
Section: Dear Editormentioning
confidence: 99%
“…w = [w 1, w 2, w 3 ] denotes different requirements for different security attributes. In practice [19], 85% interviewees hold the viewpoint that the availability is the most important security attribute; 62% interviewees believe that integrity is the security attribute with minimal impact. That is to say, in terms of their importance, the priorities are availability first, then confidentiality, and then integrity.…”
Section: Impact Analysismentioning
confidence: 99%
“…The main problem of CVSS is that it is difficult to apply it. Because the number of vulnerabilities is on a sharp increase, determining the values of metrics manually is time-consuming and subjective [37]. Furthermore, the metric values may not be obtained due to the lack of information about vulnerabilities sometimes.…”
Section: Automatic Security Vulnerability Assessment Frameworkmentioning
confidence: 99%