Proactive identification of exploits in the wild through vulnerability mentions online
暂无分享,去创建一个
Paulo Shakarian | Jana Shakarian | Eric Nunes | Mohammed Almukaynizi | Krishna Dharaiya | Manoj Senguttuvan | P. Shakarian | Eric Nunes | J. Shakarian | Mohammed Almukaynizi | Krishna Dharaiya | M. Senguttuvan | Jana Shakarian
[1] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2014, TSEC.
[2] Christopher L. Smith,et al. Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data , 2017, IWSPA@CODASPY.
[3] T. Holt,et al. Exploring stolen data markets online: products and market forces , 2010 .
[4] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[5] Stefan Savage,et al. An analysis of underground forums , 2011, IMC '11.
[6] Alan Said,et al. Predicting Cyber Vulnerability Exploits with Machine Learning , 2015, Scandinavian Conference on AI.
[7] Tudor Dumitras,et al. Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild , 2014, RAID.
[8] Mehran Bozorgi,et al. Beyond heuristics: learning to classify vulnerabilities and predict exploits , 2010, KDD.
[9] Paulo Shakarian,et al. Exploring Malicious Hacker Forums , 2016, Cyber Deception.
[10] Christopher J. Novak,et al. 2009 Data Breach Investigations Report , 2009 .
[11] Ahmad Diab,et al. Darknet and deepnet mining for proactive cybersecurity threat intelligence , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[12] Fabio Massacci,et al. Comparing Vulnerability Severity and Exploits Using Case-Control Studies , 2013, TSEC.
[13] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.
[14] Ahmad Diab,et al. Product offerings in malicious hacker markets , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).
[15] Fabio Massacci,et al. Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring , 2013, 2013 IEEE Security and Privacy Workshops.