ASVC: An automatic security vulnerability categorization framework based on novel features of vulnerability data

被引:6
|
作者
Wen, Tao [1 ,2 ]
Zhang, Yuqing [1 ,2 ]
Wu, Qianru [2 ]
Yang, Gang [2 ]
机构
[1] State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an,710071, China
[2] National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing,101408, China
来源
Journal of Communications | 2015年 / 10卷 / 02期
关键词
Compendex;
D O I
10.12720/jcm.10.2.107-116
中图分类号
学科分类号
摘要
Data mining
引用
收藏
页码:107 / 116
相关论文
共 50 条
  • [21] The Automatic Fuzzy Fingerprint Vault Based on Geometric Hashing: Vulnerability analysis and Security Enhancement
    Qiao, Guo Xiao
    Qun, Hu Ai
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 62 - 67
  • [22] Webservice based Vulnerability testing framework
    Selvam, R.
    Senthilkumar, A.
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [23] An urban drought categorization framework and the vulnerability of a lowland city to groundwater urban droughts
    Ilias Machairas
    Frans H. M. van de Ven
    Natural Hazards, 2023, 116 : 1403 - 1431
  • [24] An urban drought categorization framework and the vulnerability of a lowland city to groundwater urban droughts
    Machairas, Ilias
    van de Ven, Frans H. M.
    NATURAL HAZARDS, 2023, 116 (02) : 1403 - 1431
  • [25] A Python Security Analysis Framework in Integrity Verification and Vulnerability Detection
    PENG Shuanghe
    LIU Peiyao
    HAN Jing
    WuhanUniversityJournalofNaturalSciences, 2019, 24 (02) : 141 - 148
  • [26] Novel Method of Assessing Network Security Risks Based on Vulnerability Correlation Graph
    Liang, Li
    Yang, Jungang
    Liu, Guqing
    Zhu, Guangliang
    Yang, Yanfeng
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1085 - 1090
  • [27] A CNN-based automatic vulnerability detection
    Jung Hyun An
    Zhan Wang
    Inwhee Joe
    EURASIP Journal on Wireless Communications and Networking, 2023
  • [28] Automatic Worm Signature Generation Based on Vulnerability
    Zhang Chunhua
    Guo Shanqing
    Cui Lizheng
    Xu Qiuliang
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 83 - 86
  • [29] Vulnerability Analysis of the Grid Data Security Authentication System
    Yang, Seung S.
    Choi, Hongsik
    Joo, Hankyu
    INFORMATION SECURITY JOURNAL, 2010, 19 (04): : 182 - 190
  • [30] CloudER: A Framework for Automatic Software Vulnerability Location and Patching in the Cloud
    Chen, Ping
    Xu, Dongyan
    Mao, Bing
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,