2010 Third International Symposium on Intelligent Information Technology and Security Informatics 2010
DOI: 10.1109/iitsi.2010.141
|View full text |Cite
|
Sign up to set email alerts
|

An Ontology for Vulnerability Lifecycle

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…One study created a vulnerability management ontology that ranks attacks by security knowledge repositories [18]. Another study defined a framework to prioritize vulnerabilities [19]. Several studies have focused on mining methods and information retrieval for a security knowledge repository [20], [21], [22], [23], [24].…”
Section: Related Workmentioning
confidence: 99%
“…One study created a vulnerability management ontology that ranks attacks by security knowledge repositories [18]. Another study defined a framework to prioritize vulnerabilities [19]. Several studies have focused on mining methods and information retrieval for a security knowledge repository [20], [21], [22], [23], [24].…”
Section: Related Workmentioning
confidence: 99%
“…With the publication of CWE, new CVE entries are manually tagged with corresponding CWE concepts in National Vulnerability Database (NVD) (NIST, 2012). Connecting vulnerability databases with the CWE has numerous advantages as it provides a meaningful classification scheme that enables collection and reporting of security metrics for vulnerability distribution and trend analysis, and prioritization (Christey & Martin, 2007;Christey, 2007;Chang et al, 2011;Wita et al, 2010).…”
Section: Vulnerability Classification and Categorizationmentioning
confidence: 99%
“…On the other hand, it is not easy to detect and fix unknown security problems systematically. Activities to test the security of information systems often rely heavily on knowledge and experience of professionals involved in these activities [1][2][3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%