Prevention of exploits requires timely intelligence about the cybersecurity vulnerabilities and threats. The U.S. Computer Emergency Response Team Coordination Center (CERT/CC) is the official body to disclose vulnerability information. Increasingly, hackers also use social media to share vulnerability and exploit information. In this study, we present a conceptual ontology of cybersecurity vulnerability management that integrates information from official sources with social media intelligence. The ontology models products, threats, vulnerabilities, countermeasures, intelligence and their relations. The ontology extends the vulnerability concepts provided by National Institute of Standards and Technology (NIST) and can be used as a general...
The Web is typically our first source of information about new software vulnerabilities, exploits an...
Software applications become highly distributed and complex, involving independent collaborating com...
Abstract—Situation awareness depends on a reliable perception of the environment and comprehension o...
Considering the continuous growth in the complexity of both information systems and security informa...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
We first consider network security services and then review threats, vulnerabilities and failure mo...
In order to reach the goals of the Information Security Automation Program (ISAP) [1], we propose an...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
Software systems have become highly distributed and complex involving independent components working...
The structure and basic principles of technology for increasing the probability of identifying subj...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
The Web is typically our first source of information about new software vulnerabilities, exploits an...
Software applications become highly distributed and complex, involving independent collaborating com...
Abstract—Situation awareness depends on a reliable perception of the environment and comprehension o...
Considering the continuous growth in the complexity of both information systems and security informa...
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats...
One of the major cyber security challenges we face today is overcoming the current limits of securit...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Cyberterrorism and the use of the Internet for cyberterrorism is an emerging field. Often cyberterro...
Ontologies are a field within semantic technologies concerned with modeling knowledge of a domain th...
We first consider network security services and then review threats, vulnerabilities and failure mo...
In order to reach the goals of the Information Security Automation Program (ISAP) [1], we propose an...
Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers expl...
Software systems have become highly distributed and complex involving independent components working...
The structure and basic principles of technology for increasing the probability of identifying subj...
The prediction of attacks is essential for the prevention of potential risk. Therefore, risk forecas...
The Web is typically our first source of information about new software vulnerabilities, exploits an...
Software applications become highly distributed and complex, involving independent collaborating com...
Abstract—Situation awareness depends on a reliable perception of the environment and comprehension o...