Zobrazeno 1 - 10
of 239
pro vyhledávání: '"Al Shaer, Ehab"'
The Common Vulnerabilities and Exposures (CVE) are pivotal information for proactive cybersecurity measures, including service patching, security hardening, and more. However, CVEs typically offer low-level, product-oriented descriptions of publicly
Externí odkaz:
http://arxiv.org/abs/2309.03040
Autor:
Aghaei, Ehsan, Al-Shaer, Ehab
This paper addresses a critical challenge in cybersecurity: the gap between vulnerability information represented by Common Vulnerabilities and Exposures (CVEs) and the resulting cyberattack actions. CVEs provide insights into vulnerabilities, but of
Externí odkaz:
http://arxiv.org/abs/2309.02785
Natural Language Processing (NLP) has recently gained wide attention in cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation. Increased connection and automation have revolutionized the world's economic and cultural inf
Externí odkaz:
http://arxiv.org/abs/2204.02685
With the increasing system complexity and attack sophistication, the necessity of autonomous cyber defense becomes vivid for cyber and cyber-physical systems (CPSs). Many existing frameworks in the current state-of-the-art either rely on static model
Externí odkaz:
http://arxiv.org/abs/2104.08994
Autor:
Das, Siddhartha Shankar, Serra, Edoardo, Halappanavar, Mahantesh, Pothen, Alex, Al-Shaer, Ehab
Weaknesses in computer systems such as faults, bugs and errors in the architecture, design or implementation of software provide vulnerabilities that can be exploited by attackers to compromise the security of a system. Common Weakness Enumerations (
Externí odkaz:
http://arxiv.org/abs/2102.11498
Publikováno v:
EAI SecureComm 2020, 16th EAI International Conference on Security and Privacy in Communication Networks
The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing publicly known information security vulnerabilities. One or more CVEs are grouped into the Common Weakness Enumeration (CWE) classes for the purpose of understanding
Externí odkaz:
http://arxiv.org/abs/2009.11501
Autor:
Dalton, Adam, Aghaei, Ehsan, Al-Shaer, Ehab, Bhatia, Archna, Castillo, Esteban, Cheng, Zhuo, Dhaduvai, Sreekar, Duan, Qi, Islam, Md Mazharul, Karimi, Younes, Masoumzadeh, Amir, Mather, Brodie, Santhanam, Sashank, Shaikh, Samira, Strzalkowski, Tomek, Dorr, Bonnie J.
We describe Panacea, a system that supports natural language processing (NLP) components for active defenses against social engineering attacks. We deploy a pipeline of human language technology, including Ask and Framing Detection, Named Entity Reco
Externí odkaz:
http://arxiv.org/abs/2004.09662
Plug-in Hybrid Electric Vehicles (PHEVs) are gaining popularity due to their economic efficiency as well as their contribution to green management. PHEVs allow the driver to use electric power exclusively for driving and then switch to gasoline as ne
Externí odkaz:
http://arxiv.org/abs/1907.00540
Internet of Things (IoT) has become a common paradigm for different domains such as health care, transportation infrastructure, smart home, smart shopping, and e-commerce. With its interoperable functionality, it is now possible to connect all domain
Externí odkaz:
http://arxiv.org/abs/1812.03966