Automated software vulnerability assessment with concept drift

作者: M. Ali Babar , Triet Huynh Minh Le , Bushra Sabir

DOI: 10.1109/MSR.2019.00063

关键词:

摘要: Software Engineering researchers are increasingly using Natural Language Processing (NLP) techniques to automate Software Vulnerabilities (SVs) assessment using the …

参考文章(49)
Radim Řehůřek, Petr Sojka, Software Framework for Topic Modelling with Large Corpora University of Malta. ,(2010)
Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitraş, Some Vulnerabilities Are Different Than Others recent advances in intrusion detection. pp. 426- 446 ,(2014) , 10.1007/978-3-319-11379-1_21
Tudor Dumitras, Carl Sabottke, Octavian Suciu, Vulnerability disclosure in the age of social media: exploiting twitter for predicting real-world exploits usenix security symposium. pp. 1041- 1056 ,(2015)
Tin Kam Ho, Random decision forests international conference on document analysis and recognition. ,vol. 1, pp. 278- 282 ,(1995) , 10.1109/ICDAR.1995.598994
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker, Beyond heuristics: learning to classify vulnerabilities and predict exploits knowledge discovery and data mining. pp. 105- 114 ,(2010) , 10.1145/1835804.1835821
Christoph Bergmeir, José M. Benítez, On the use of cross-validation for time series predictor evaluation Information Sciences. ,vol. 191, pp. 192- 213 ,(2012) , 10.1016/J.INS.2011.12.028
Georgios Spanos, Angeliki Sioziou, Lefteris Angelis, WIVSS: a new methodology for scoring information systems vulnerabilities panhellenic conference on informatics. pp. 83- 90 ,(2013) , 10.1145/2491845.2491871
Stephan Neuhaus, Thomas Zimmermann, Security Trend Analysis with CVE Topic Models international symposium on software reliability engineering. pp. 111- 120 ,(2010) , 10.1109/ISSRE.2010.53
STROTHER H. WALKER, DAVID B. DUNCAN, Estimation of the probability of an event as a function of several independent variables Biometrika. ,vol. 54, pp. 167- 179 ,(1967) , 10.1093/BIOMET/54.1-2.167
Anselm Blumer, Andrzej Ehrenfeucht, David Haussler, Manfred K. Warmuth, Occam's razor Information Processing Letters. ,vol. 24, pp. 377- 380 ,(1987) , 10.1016/0020-0190(87)90114-1