CVE Severity Prediction From Vulnerability Description - A Deep Learning Approach
Abstract
Reference
Recommendations
A vulnerability severity prediction method based on bimodal data and multi-task learning
Highlights- A new vulnerability severity prediction method is proposed to improve the F1 score.
- The GraphCodeBert is used to provide comprehensive information for prediction.
- Multi-task learning is used to enhance the generalization ability of ...
AbstractFacing the increasing number of software vulnerabilities, the automatic analysis of vulnerabilities has become an important task in the field of software security. However, the existing severity prediction methods are mainly based on ...
Vulnerability scoring for security configuration settings
QoP '08: Proceedings of the 4th ACM workshop on Quality of protectionThe best-known vulnerability scoring standard, the Common Vulnerability Scoring System (CVSS), is designed to quantify the severity of security-related software flaw vulnerabilities. This paper describes our efforts to determine if CVSS could be adapted ...
A Conceptual Replication on Predicting the Severity of Software Vulnerabilities
EASE '19: Proceedings of the 23rd International Conference on Evaluation and Assessment in Software EngineeringSoftware vulnerabilities may lead to crucial security risks in software systems. Thus, prioritization of the vulnerabilities is an important task for security teams, and assessing how severe the vulnerabilities are would help teams during fixing and ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Elsevier Science Publishers B. V.
Netherlands
Publication History
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in