Publisher
Springer Science and Business Media LLC
Reference46 articles.
1. Binyamini H, Bitton R, Inokuchi M, Yagyu T, Elovici Y, Shabtai A (2021) A framework for modeling cyber attack techniques from security vulnerability descriptions. Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining
2. Cheng Y, Yang S, Lang Z, Shi Z, Sun L (2023) VERI: a large-scale open-source components vulnerability detection in iot firmware. Comput Secur 126:103068
3. Cnblogs (2022) Several major sequence annotation methods? https://www.cnblogs.com/zjuhaohaoxuexi/p/15506307.html
4. Costa JC, Roxo T, Sequeiros JBF, Proenca H, Inacio PRM (2022) Predicting cvss metric via description interpretation. IEEE Access 10:59125–59134
5. Dong Y, Guo W, Chen Y, Xing X, Zhang Y, Wang G (2019) Towards the detection of inconsistencies in public security vulnerability reports. In USENIX Security symposium