A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Automated Extraction of Vulnerability Information for Home Computer Security
[chapter]
2015
Lecture Notes in Computer Science
Online vulnerability databases provide a wealth of information pertaining to vulnerabilities that are present in computer application software, operating systems, and firmware. Extracting useful information from these databases that can subsequently be utilized by applications such as vulnerability scanners and security monitoring tools can be a challenging task. This paper presents two approaches to information extraction from online vulnerability databases: a machine learning based solution
doi:10.1007/978-3-319-17040-4_24
fatcat:fugaasniarcivd62rp2yjhx6fq