An improved vulnerability exploitation prediction model with novel cost function and custom trained word vector embedding
Successful cyber-attacks are caused by the exploitation of some vulnerabilities in the software and/or hardware that exist in systems deployed in premises or the cloud. Although hundreds of vulnerabilities are discovered every year, only a small fraction of them actually become exploited, thereby th...
Saved in:
Main Authors: | Mohammad Shamsul Hoque, Norziana Jamil, Nowshad Amin, Lam, Kwok-Yan |
---|---|
Other Authors: | School of Computer Science and Engineering |
Format: | Article |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/153900 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
EXPLOITING TAGGED AND UNTAGGED CORPORA
FOR WORD SENSE DISAMBIGUATION
by: NIU ZHENGYU
Published: (2010) -
Reliability-adaptive consistency regularization for weakly-supervised point cloud segmentation
by: Wu, Zhonghua, et al.
Published: (2024) -
Exploring the use of pre-trained transformer-based models and semi-supervised learning to build training sets for text classification
by: Te, Gian Marco I.
Published: (2022) -
Privacy-preserving outsourced support vector machine design for secure drug discovery
by: LIU, Ximeng, et al.
Published: (2020) -
Semantic visualization for short texts with word embeddings
by: LE, Van Minh Tuan, et al.
Published: (2017)