Many public sources of cyber threat and vulnerability information exist to serve the defense of cyber systems.
Cryptography and Security
In this paper, we investigate methods to analyze the severity of cybersecurity threats based on the language that is used to describe them online.
Robots are typically not created with security as a main concern.
Robotics Cryptography and Security
Software supply chain attacks, which exploit the build process or artifacts used in the process of building a software product, are increasingly of concern.
Software Engineering Cryptography and Security
We also address the issue of prioritizing vulnerabilities that when fixed, improves the security of the MTD system.
Neural networks have achieved remarkable performance across various problem domains, but their widespread applicability is hindered by inherent limitations such as overconfidence in predictions, lack of interpretability, and vulnerability to adversarial attacks.
Data-driven research on the automated discovery and repair of security vulnerabilities in source code requires comprehensive datasets of real-life vulnerable code and their fixes.
The absolute majority of software today is developed collaboratively using collaborative version control tools such as Git.
Despite Wi-Fi is at the eve of its seventh generation, security concerns regarding this omnipresent technology remain in the spotlight of the research community.
Cryptography and Security
Experimental results demonstrate that our proposed FedRecAttack achieves the state-of-the-art effectiveness while its side effects are negligible.