Publication | Closed Access
Which is the right source for vulnerability studies?
51
Citations
32
References
2010
Year
Unknown Venue
Public Vulnerability DatabasesEngineeringInformation SecuritySecurity AssessmentVulnerability AnalysisVulnerability Assessment (Computing)Vulnerable ComponentsData ScienceData MiningRight SourceRisk ManagementManagementPublic HealthStatisticsDisaster VulnerabilityPredictive AnalyticsKnowledge DiscoveryComputer ScienceRisk AssessmentVulnerable PopulationVulnerability DiscoveryQuantitative Security AssessmentSecurity MeasurementThreat ModelVulnerability StudiesData Modeling
Recent years have seen a trend towards the notion of quantitative security assessment and the use of empirical methods to analyze or predict vulnerable components. Many papers focused on vulnerability discovery models based upon either a public vulnerability databases (e.g., CVE, NVD), or vendor ones (e.g., MFSA). Some combine these databases. Most of these works address a knowledge problem: can we understand the empirical causes of vulnerabilities? Can we predict them? Still, if the data sources do not completely capture the phenomenon we are interested in predicting, then our predictor might be optimal with respect to the data we have but unsatisfactory in practice.
| Year | Citations | |
|---|---|---|
Page 1
Page 1