Towards the generation of hierarchical attack models from cybersecurity
vulnerabilities using language modelsApplied Soft Computing (Appl. Soft Comput.), 2024 |
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key
Aspect ExplanationInternational Conference on Software Engineering (ICSE), 2023 |
A Survey on Data-driven Software Vulnerability Assessment and
PrioritizationACM Computing Surveys (CSUR), 2021 |