Author:
Aghaei Ehsan,Shadid Waseem,Al-Shaer Ehab
Publisher
Springer International Publishing
Reference14 articles.
1. National vulnerability database (2018). https://nvd.nist.gov/
2. Aghaei, E., Al-Shaer, E.: Threatzoom: neural network for automated vulnerability mitigation. In: Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, pp. 1–3 (2019)
3. Aghaei, E., Serpen, G.: Ensemble classifier for misuse detection using n-gram feature vectors through operating system call traces. Int. J. Hybrid Intell. Syst. 14(3), 141–154 (2017)
4. Aghaei, E., Serpen, G.: Host-based anomaly detection using eigentraces feature extraction and one-class classification on system call trace data. J. Inf. Assur. Secur. (JIAS) 14(4), 106–117 (2019)
5. Corporate, M.: Common vulnerabilities and exposures (2018). https://cve.mitre.org/
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献