Centralized vulnerability database for organization specific automated vulnerabilities discovery and supervision
暂无分享,去创建一个
[1] Robert Roedler,et al. Detection of Zero Day Exploits Using Real-Time Social Media Streams , 2015, NaBIC.
[2] Igor V. Kotenko,et al. Integrated Repository of Security Information for Network Security Evaluation , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[3] N.C. Rowe,et al. Automatically Building an Information-Security Vulnerability Database , 2006, 2006 IEEE Information Assurance Workshop.
[4] Mehran Bozorgi,et al. Beyond heuristics: learning to classify vulnerabilities and predict exploits , 2010, KDD.
[5] Markus Schumacher,et al. Data Mining in Vulnerability Databases , 2000 .
[6] Indrajit Ray,et al. Automated Extraction of Vulnerability Information for Home Computer Security , 2014, FPS.
[7] Timothy W. Finin,et al. Extracting Information about Security Vulnerabilities from Web Text , 2011, 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.