2019 IEEE International Symposium on Technologies for Homeland Security (HST) 2019
DOI: 10.1109/hst47167.2019.9032910
|View full text |Cite
|
Sign up to set email alerts
|

Threat analyses using vulnerability databases —Possibility of utilizing past analysis results—

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Umezawa et al [13] proposed a threat analysis approach that uses data from vulnerability databases as well as system design information.…”
Section: Matching Approachesmentioning
confidence: 99%
“…Umezawa et al [13] proposed a threat analysis approach that uses data from vulnerability databases as well as system design information.…”
Section: Matching Approachesmentioning
confidence: 99%
“…To perform vulnerability assessment, cyber defenders can either manually obtain and process information about the discovered computer security vulnerabilities from the publicly available vulnerability databases (VDBs) [3][4][5] such as NVD, Common Vulnerabilities And Exposures (CVE), Open Source Vulnerability Database (OSVDB), etc. or use vulnerability scanning tools [6][7][8].…”
Section: Introductionmentioning
confidence: 99%