Cargando…
An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding
Successful cyber-attacks are caused by the exploitation of some vulnerabilities in the software and/or hardware that exist in systems deployed in premises or the cloud. Although hundreds of vulnerabilities are discovered every year, only a small fraction of them actually become exploited, thereby th...
Autores principales: | Hoque, Mohammad Shamsul, Jamil, Norziana, Amin, Nowshad, Lam, Kwok-Yan |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8235709/ https://www.ncbi.nlm.nih.gov/pubmed/34202977 http://dx.doi.org/10.3390/s21124220 |
Ejemplares similares
-
Joint embedding VQA model based on dynamic word vector
por: Ma, Zhiyang, et al.
Publicado: (2021) -
Word embeddings
por: Hellrich, J
Publicado: (2019) -
Definition of customer requirements in big data using word vectors
and affinity propagation clustering
por: Shi, Yanlin, et al.
Publicado: (2021) -
WET: Word embedding-topic distribution vectors for MOOC video lectures dataset
por: Kastrati, Zenun, et al.
Publicado: (2020) -
A Word on Words in Words: How Do Embedded Words Affect Reading?
por: Snell, Joshua, et al.
Publicado: (2018)