Machine Learning - Special issue on learning with probabilistic representations
Software vulnerability analysis
Software vulnerability analysis
Ontology-based security assessment for software products
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Measuring Similarity for Security Vulnerabilities
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
Ranking Attacks Based on Vulnerability Analysis
HICSS '10 Proceedings of the 2010 43rd Hawaii International Conference on System Sciences
An Ontological Approach to Computer System Security
Information Security Journal: A Global Perspective
EVMAT: an OVAL and NVD based enterprise vulnerability modeling and assessment tool
Proceedings of the 49th Annual Southeast Regional Conference
A multi-layer tree model for enterprise vulnerability management
Proceedings of the 2011 conference on Information technology education
Hi-index | 0.00 |
This paper proposes a novel model and methodology to classify and categorize vulnerabilities according to their security types. We use Bayesian networks to automate the process. An example is provided to demonstrate the process of categorization. The automatically generated result is compared to the CVE type in NVD [6], and it proved the correctness of our method.