Author:
Yoon Seong-Su,Kim Do-Yeon,Kim Ga-Gyeong,Euom Ieck-Chae
Publisher
Springer Nature Singapore
Reference17 articles.
1. Bulut, M.F., et al.: Vulnerability prioritization: an offensive security approach. arXiv preprint arXiv:2206.11182 (2022)
2. Yang, H., et al.: Better not to use vulnerability’s reference for exploitability prediction. Appl. Sci. 10(7), 2555 (2020)
3. FIRST CVSS Documentation. https://www.first.org/cvss/specification-document. Accessed 18 June 2023
4. FIRST EPSS Model. https://www.first.org/epss/model.Accessed 18 June 2023
5. Jung, B., Li, Y., Bechor, T.: CAVP: a context-aware vulnerability prioritization model. Comput. Secur. 116, 102639 (2022)