Survivability analysis of networked systems
ICSE '01 Proceedings of the 23rd International Conference on Software Engineering
Risk Management using Behavior based Attack Graphs
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Vulnerability Profile for Linux
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Semantic similarity methods in wordNet and their application to information retrieval on the web
Proceedings of the 7th annual ACM international workshop on Web information and data management
Large-scale vulnerability analysis
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Document Classification Based on Support Vector Machine Using a Concept Vector Model
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
Distance-Based Classification in OWL Ontologies
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
Probability of Attack Based on System Vulnerability Life Cycle
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
Hi-index | 0.00 |
System vulnerability is the common weak point for attacker to break into the system. Patching or reconfiguration is usually slow, and difficult or risky to system stability. Our research defines a framework for vulnerability prioritization based on relevancy calculated from online information. In this paper, the idea of subcontext and the Ontology-based Document Profile (ODP) are introduced. ODP is calculated based on how much the document describes each subcontext of the interested topic. The ODP represents a document in term of vector of subcontext. We also compare ODP to traditional document vector using vector support machine classification. The ODP will be used to represent individual document in the vulnerability relevancy framework.