Now showing items 1-2 of 2
Extracting cybersecurity related linked data from text
(IEEE Computer Society Press, 2013-09-16)
The Web is typically our first source of information about new software vulnerabilities, exploits and cyber-attacks. Information is found in semi-structured vulnerability databases as well as in text from security bulletins, ...
A Knowledge-Based Approach To Intrusion Detection Modeling
Current state of the art intrusion detection and prevention systems (IDPS) are signature-based systems that detect threats and vulnerabilities by cross-referencing the threat or vulnerability signatures in their databases. ...