Improving vulnerability remediation through better exploit prediction
暂无分享,去创建一个
Sasha Romanosky | Jay Jacobs | Idris Adjerid | Wade Baker | Idris Adjerid | W. Baker | Sasha Romanosky | Jay Jacobs
[1] Terrence August,et al. Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments , 2011, WEIS.
[2] Mark Crovella,et al. Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.
[3] Mehran Bozorgi,et al. Beyond heuristics: learning to classify vulnerabilities and predict exploits , 2010, KDD.
[4] Jun Zhang,et al. Security Patch Management: Share the Burden or Share the Damage? , 2008, Manag. Sci..
[5] Tianqi Chen,et al. XGBoost: A Scalable Tree Boosting System , 2016, KDD.
[6] Rahul Telang,et al. Market for Software Vulnerabilities? Think Again , 2005, Manag. Sci..
[7] Sam Ransbotham,et al. Are Markets for Vulnerabilities Effective? , 2012, MIS Q..
[8] Guoying Zhang,et al. Optimal Policies for Security Patch Management , 2015, INFORMS J. Comput..
[9] Terrence August,et al. Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions , 2008, Inf. Syst. Res..
[10] Sam Ransbotham,et al. Choice and Chance: A Conceptual Model of Paths to Information Security Compromise , 2009, Inf. Syst. Res..
[11] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[12] Nancy Chinchor,et al. MUC-4 evaluation metrics , 1992, MUC.
[13] Georg Carle,et al. Traffic Anomaly Detection Using K-Means Clustering , 2007 .
[14] Christopher L. Smith,et al. Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data , 2017, IWSPA@CODASPY.
[15] Michel Edkrantz,et al. Predicting Exploit Likelihood for Cyber Vulnerabilities with Machine Learning , 2015 .
[16] Stan Matwin,et al. Addressing the Curse of Imbalanced Training Sets: One-Sided Selection , 1997, ICML.
[17] J. Friedman. Greedy function approximation: A gradient boosting machine. , 2001 .
[18] Crispin Cowan,et al. Timing the Application of Security Patches for Optimal Uptime , 2002, LISA.
[19] Huseyin Cavusoglu,et al. Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge , 2007, IEEE Transactions on Software Engineering.
[20] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2014, TSEC.
[21] Mark Crovella,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM '04.
[22] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2013, TSEC.
[23] Terrence August,et al. Market Segmentation and Software Security: Pricing Patching Rights , 2019, Manag. Sci..
[24] Hao Xu,et al. Optimal Policy for Software Vulnerability Disclosure , 2008, Manag. Sci..
[25] Nick Cramer,et al. Automatic Keyword Extraction from Individual Documents , 2010 .
[26] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.