Predicting Vulnerability Exploits in the Wild
暂无分享,去创建一个
[1] Bernhard Plattner,et al. Large-scale vulnerability analysis , 2006, LSAD '06.
[2] Christopher J. Novak,et al. 2009 Data Breach Investigations Report , 2009 .
[3] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[4] Bernhard Plattner,et al. Modelling the Security Ecosystem- The Dynamics of (In)Security , 2009, WEIS.
[5] Tudor Dumitras,et al. Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild , 2014, RAID.
[6] Tudor Dumitras,et al. Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.
[7] Michel Edkrantz,et al. Predicting Exploit Likelihood for Cyber Vulnerabilities with Machine Learning , 2015 .
[8] Mehran Bozorgi,et al. Beyond heuristics: learning to classify vulnerabilities and predict exploits , 2010, KDD.
[9] Fabio Massacci,et al. A preliminary analysis of vulnerability scores for attacks in wild: the ekits and sym datasets , 2012, BADGERS@CCS.
[10] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .