ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2009.11501
  4. Cited By
ThreatZoom: CVE2CWE using Hierarchical Neural Network

ThreatZoom: CVE2CWE using Hierarchical Neural Network

Security and Privacy in Communication Networks (SecureComm), 2020
24 September 2020
Ehsan Aghaei
W. Shadid
E. Al-Shaer
ArXiv (abs)PDFHTML

Papers citing "ThreatZoom: CVE2CWE using Hierarchical Neural Network"

4 / 4 papers shown
Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting
Benchmarking LLM-Assisted Blue Teaming via Standardized Threat Hunting
Y. Meng
Luoxi Tang
Feiyang Yu
Xi Li
Guanhua Yan
Ping Yang
Zhaohan Xi
186
3
0
28 Sep 2025
Attack Techniques and Threat Identification for Vulnerabilities
Attack Techniques and Threat Identification for Vulnerabilities
C. Adam
M. F. Bulut
Daby M. Sow
Steven Ocepek
Chris Bedell
Lilian Ngweta
AAML
76
6
0
22 Jun 2022
SecureBERT: A Domain-Specific Language Model for Cybersecurity
SecureBERT: A Domain-Specific Language Model for CybersecuritySecurity and Privacy in Communication Networks (SecureComm), 2022
Ehsan Aghaei
Xi Niu
W. Shadid
E. Al-Shaer
228
180
0
06 Apr 2022
A Survey on Data-driven Software Vulnerability Assessment and
  Prioritization
A Survey on Data-driven Software Vulnerability Assessment and PrioritizationACM Computing Surveys (CSUR), 2021
T. H. Le
Huaming Chen
Muhammad Ali Babar
557
121
0
18 Jul 2021
1
Page 1 of 1