Cargando…

An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding

Successful cyber-attacks are caused by the exploitation of some vulnerabilities in the software and/or hardware that exist in systems deployed in premises or the cloud. Although hundreds of vulnerabilities are discovered every year, only a small fraction of them actually become exploited, thereby th...

Descripción completa

Detalles Bibliográficos
Autores principales: Hoque, Mohammad Shamsul, Jamil, Norziana, Amin, Nowshad, Lam, Kwok-Yan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8235709/
https://www.ncbi.nlm.nih.gov/pubmed/34202977
http://dx.doi.org/10.3390/s21124220