2018
DOI: 10.1109/tdsc.2016.2644614
|View full text |Cite
|
Sign up to set email alerts
|

Can the Common Vulnerability Scoring System be Trusted? A Bayesian Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
53
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 70 publications
(53 citation statements)
references
References 14 publications
0
53
0
Order By: Relevance
“…Once the classification and evaluation work has been completed for a vulnerability identified with a CVE, the structured and quantified severity information is stored to vulnerability databases. Motivated by a recent empirical evaluation [16], this paper examines the time delays between the publication of CVEs and the usually later publication of CVSS information. The scope is restricted to NVD and the second revision of the CVSS standard.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Once the classification and evaluation work has been completed for a vulnerability identified with a CVE, the structured and quantified severity information is stored to vulnerability databases. Motivated by a recent empirical evaluation [16], this paper examines the time delays between the publication of CVEs and the usually later publication of CVSS information. The scope is restricted to NVD and the second revision of the CVSS standard.…”
Section: Introductionmentioning
confidence: 99%
“…The standard has been also incorporated into different governmental security risk, threat, and intelligence systems. Furthermore, CVSS information is used in numerous different commercial products [16], ranging from vulnerability scanners and compliance assessment tools to automated penetration testing and intrusion detection systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The above discussion signifies the for any security assessment CVSS is widely adopted by the different field of the research domain and for the initial stage of estimation, CVSS is an important tool for the research workers. The authors P. Johnson et al in their research work check the credibility of CVSS scorings based on five foremost databases (OSVDB, CERT-VN, NVD, X-Force, and Cisco) [16]. The outcome suggests that with the special case of some measurements, the CVSS is very dependable.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…In 2017 and 2018, around 14 700 and 16 500 new vulnerabilities respectively were reported. It requires both effort and knowledge to be able to evaluate these vulnerabilities, sometimes found in several different public databases, non-trivial to fuse when there is conflicting information [4].…”
Section: Introductionmentioning
confidence: 99%