2018
DOI: 10.1007/978-3-319-91662-0_3
|View full text |Cite
|
Sign up to set email alerts
|

Refining Traceability Links Between Vulnerability and Software Component in a Vulnerability Knowledge Graph

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…For searching specific vulnerabilities or weaknesses from software repositories, simple keyword searches based on CVE and CWE identifiers seem more robust. These commonly used [4,13,31] domain-specific searches could be augmented by the information retrieval techniques [5], however. In other words: it might be possible to prefer the regular expression searches as a primary retrieval technique and use the information retrieval techniques as a secondary method for retrieving additional content not captured by the keyword-based searches.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…For searching specific vulnerabilities or weaknesses from software repositories, simple keyword searches based on CVE and CWE identifiers seem more robust. These commonly used [4,13,31] domain-specific searches could be augmented by the information retrieval techniques [5], however. In other words: it might be possible to prefer the regular expression searches as a primary retrieval technique and use the information retrieval techniques as a secondary method for retrieving additional content not captured by the keyword-based searches.…”
Section: Discussionmentioning
confidence: 99%
“…1), web crawling could be used to gather a truly massive dataset for text mining. Recent work [4] shows also some promise for web crawling approaches. But the larger the datasets, the coarser the mappings, and the bigger the validity concerns.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Just as we are concerned with the vulnerability domain, Syed conceptualized an ontological representation that integrates social media intelligence with official information for the purpose of vulnerability management [13]. Du et al developed a software vulnerability ontology to keep track of links between vulnerabilities and software components, applying two ontology matching techniques [14].…”
Section: Security Domain-specific Kgsmentioning
confidence: 99%