Next-Generation Security Entity Linkage: Harnessing the Power of Knowledge Graphs and Large Language
Abstract
References
Index Terms
- Next-Generation Security Entity Linkage: Harnessing the Power of Knowledge Graphs and Large Language
Recommendations
ThreatZoom: neural network for automated vulnerability mitigation
HotSoS '19: Proceedings of the 6th Annual Symposium on Hot Topics in the Science of SecurityIncreasing the variety and quantity of cyber threats becoming the evident that traditional human-in-loop approaches are no longer sufficient to keep systems safe. To address this momentous moot point, forward-thinking pioneers propose new cyber security ...
Vulnerability Detection for software-intensive system
EASE '24: Proceedings of the 28th International Conference on Evaluation and Assessment in Software EngineeringCyberattacks are becoming more sophisticated, and organizations are constantly under threat from various types of security breaches. To protect against these threats, it is essential to identify the vulnerability and impact of these weaknesses and ...
On the Usage of NLP on CVE Descriptions for Calculating Risk
Computer Security. ESORICS 2023 International WorkshopsAbstractIn order to conduct a risk analysis on an ecosystem the potential threats to its assets must first be identified. The Risk Modelling Tool (RMT) of the CitySCAPE Project uses CWE - CAPEC - threat relationships that were mapped for identifying the ...
Comments
Information & Contributors
Information
Published In
- Chair:
- Yosef Moatti,
- General Chair:
- Ofer Biran,
- Program Chairs:
- Yossi Gilad,
- Dejan Kostic
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Extended-abstract
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 89Total Downloads
- Downloads (Last 12 months)44
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in