Proceedings of the 21st Pan-Hellenic Conference on Informatics 2017
DOI: 10.1145/3139367.3139390
|View full text |Cite
|
Sign up to set email alerts
|

Assessment of Vulnerability Severity using Text Mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(23 citation statements)
references
References 20 publications
2
21
0
Order By: Relevance
“…Besides each output, we also examined the validated results across different types of classifiers (single vs. ensemble models) and NLP representations (n-grams and tf-idf vs. term frequency). Since the NLP representations mostly affect the classifiers, their validated results are grouped by six classifiers in Table V result agrees with the existing work [6], [7]. It seemed that n-grams with n > 1 improved the result.…”
Section: B Rq2: Which Are the Optimal Models For Multi-classification Of Each Vulnerability Characteristic?supporting
confidence: 85%
See 3 more Smart Citations
“…Besides each output, we also examined the validated results across different types of classifiers (single vs. ensemble models) and NLP representations (n-grams and tf-idf vs. term frequency). Since the NLP representations mostly affect the classifiers, their validated results are grouped by six classifiers in Table V result agrees with the existing work [6], [7]. It seemed that n-grams with n > 1 improved the result.…”
Section: B Rq2: Which Are the Optimal Models For Multi-classification Of Each Vulnerability Characteristic?supporting
confidence: 85%
“…Our multi-class classification problem can be decomposed into multiple binary classification problems. To define the standard evaluation metrics for a binary problem [6], [7], [8], we first describe four possibilities as follows.…”
Section: Evaluation Metricsmentioning
confidence: 99%
See 2 more Smart Citations
“…Some researchers think that machine learning and text mining could be used to automate the process of assigning CVSS scores by intelligently interpreting vulnerability descriptions. 48 Other researchers have used data about attacks observed in the wild to build machine learning systems that predict the likelihood of some vulnerabilities actually being exploited. 49 There is some evidence that when these machine learning-based risk assessments are used in conjunction with the CVSS, organizations can achieve similar levels of risk remediation for significantly less effort by prioritizing their remediation efforts on the vulnerabilities that are most likely to be exploited.…”
Section: Prevention Figurementioning
confidence: 99%