An improved vulnerability exploitation prediction model with novel cost function and custom trained word vector embedding

Successful cyber-attacks are caused by the exploitation of some vulnerabilities in the software and/or hardware that exist in systems deployed in premises or the cloud. Although hundreds of vulnerabilities are discovered every year, only a small fraction of them actually become exploited, thereby th...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammad Shamsul Hoque, Norziana Jamil, Nowshad Amin, Lam, Kwok-Yan
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2022
Subjects:
Online Access:https://hdl.handle.net/10356/153900
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English