Now showing items 1-2 of 2
CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities
In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert ...
Extracting Information about Security Vulnerabilities from Web Text
The Web is an important source of information about computer security threats, vulnerabilities and cyber-attacks. We present initial work on developing a framework to detect and extract information about vulnerabilities ...