2018 Sixth International Symposium on Computing and Networking (CANDAR) 2018
DOI: 10.1109/candar.2018.00009
|View full text |Cite
|
Sign up to set email alerts
|

The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 8 publications
0
16
0
Order By: Relevance
“…The Common Vulnerability Scoring System (CVSS) [9] brings together practices, standards and guidelines useful in the industry. CVSS helps determine the severity and specifications of vulnerability by converting a qualitative input to a digital output.…”
Section: Risk Assessment Methodologiesmentioning
confidence: 99%
“…The Common Vulnerability Scoring System (CVSS) [9] brings together practices, standards and guidelines useful in the industry. CVSS helps determine the severity and specifications of vulnerability by converting a qualitative input to a digital output.…”
Section: Risk Assessment Methodologiesmentioning
confidence: 99%
“…We select fastText proposed by Joulin et al [23,24] to train a neural language model, and its classification results or the sum of word representations will be combined with other features as input to the final prediction model. For short texts related to vulnerabilities, using fas-tText classification model can often achieve good results.…”
Section: Text Featurementioning
confidence: 99%
“…Since the aim is to identify blogs that describe exploited vulnerabilities, we use the fas-tEmbed model to implement 5-fold cross-validation on limited data. The fastEmbed model learns the embeddings of character n-grams and represents every word as a sum of the n-gram vectors [24]. Then we average all the word vectors in a blog as the feature of LightGBM classifier.…”
Section: Security Blogsmentioning
confidence: 99%
See 1 more Smart Citation
“…Calculating the Utility. According to Richard [27], common vulnerability [28] and the database of attack-anddefense behaviors from MIT [29], attack strategies that are composed of basic options are listed in Table 2.…”
Section: 2mentioning
confidence: 99%