Vulnerability trends can be very useful for informing the cyber risk management process. The objective of this paper is to analyze trends in Common Vulnerabilities and Exposures (CVE) data feeds from 2003 to 2021 using Common Vulnerability Scoring System (CVSS) version 2.0 scores. Data for 147,547 CVEs through June 2021 were downloaded from the National Vulnerability Database (NVD), parsed via Python-based text mining, and analyzed to identify various trends. Findings include a sharp increase in vulnerability integration, a slight decline in average base score of vulnerabilities over time, and the prevalence of exploits surrounding the Android operating system and man-in-the-middle attacks. This information may aid security measurement and ...
International audienceWhile Common Vulnerabilities and Exposures (CVE) has become de facto a standar...
Data security is becoming more relevant as more and more information is stored digitally and many ne...
Abstract—(U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measur...
Today, digital development is happening at such a high rate that security is not as prioritized as i...
Due to the ever-increasing threat posed by cyber-attacks on important cyber infrastructure, companie...
We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using...
Rising vulnerability statistics demands multidimensional trend analysis for efficient threat mitigat...
Advances in Information Security book series (ADIS, volume 70): Cyber Threat IntelligenceVarious res...
Being in the era of information technology, importance and applicability of analytical statistical m...
Being in the era of information technology, importance and applicability of analytical statistical m...
New features are being added into mobile devices such as smart phones and tablets every day. Previou...
International audienceWhile Common Vulnerabilities and Exposures (CVE) has become de facto a standar...
International audienceWhile Common Vulnerabilities and Exposures (CVE) has become de facto a standar...
Understanding and measuring security of softwarein terms of vulnerability metrics is important when ...
This empirical paper examines the time delays that occur between the publication of Common Vulnerabi...
International audienceWhile Common Vulnerabilities and Exposures (CVE) has become de facto a standar...
Data security is becoming more relevant as more and more information is stored digitally and many ne...
Abstract—(U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measur...
Today, digital development is happening at such a high rate that security is not as prioritized as i...
Due to the ever-increasing threat posed by cyber-attacks on important cyber infrastructure, companie...
We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using...
Rising vulnerability statistics demands multidimensional trend analysis for efficient threat mitigat...
Advances in Information Security book series (ADIS, volume 70): Cyber Threat IntelligenceVarious res...
Being in the era of information technology, importance and applicability of analytical statistical m...
Being in the era of information technology, importance and applicability of analytical statistical m...
New features are being added into mobile devices such as smart phones and tablets every day. Previou...
International audienceWhile Common Vulnerabilities and Exposures (CVE) has become de facto a standar...
International audienceWhile Common Vulnerabilities and Exposures (CVE) has become de facto a standar...
Understanding and measuring security of softwarein terms of vulnerability metrics is important when ...
This empirical paper examines the time delays that occur between the publication of Common Vulnerabi...
International audienceWhile Common Vulnerabilities and Exposures (CVE) has become de facto a standar...
Data security is becoming more relevant as more and more information is stored digitally and many ne...
Abstract—(U.S) Rule-based policies to mitigate software risk suggest to use the CVSS score to measur...