Academic literature on the topic 'CVSS score'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CVSS score.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "CVSS score"

1

Nowak, Maciej Roman, Michał Walkowski, and Sławomir Sujecki. "Support for the Vulnerability Management Process Using Conversion CVSS Base Score 2.0 to 3.x." Sensors 23, no. 4 (2023): 1802. http://dx.doi.org/10.3390/s23041802.

Full text
Abstract:
COVID-19 forced a number of changes in many areas of life, which resulted in an increase in human activity in cyberspace. Furthermore, the number of cyberattacks has increased. In such circumstances, detection, accurate prioritisation, and timely removal of critical vulnerabilities is of key importance for ensuring the security of various organisations. One of the most-commonly used vulnerability assessment standards is the Common Vulnerability Scoring System (CVSS), which allows for assessing the degree of vulnerability criticality on a scale from 0 to 10. Unfortunately, not all detected vuln
APA, Harvard, Vancouver, ISO, and other styles
2

Saragih, Naikson, and Theo Zebua. "Analisis Keamanan dan Implementasi Secure Code Pada Pengembangan Keamanan Websitefikom-methodist.com Menggunakan Penetration Testing dan CVSS." Jurnal Informatika Kaputama (JIK) 7, no. 2 (2023): 242–53. http://dx.doi.org/10.59697/jik.v7i2.233.

Full text
Abstract:
Keamanan website fikom-methodist.com adalah hal yang penting sebagai Portal aplikasi administrasi data internal di Fakultas Ilmu Komputer Universitas Methodist Indonesia. Sayangnya fikom-methodist.com pernah diserang dan tercatat dalam rekam jejak pada Global Cyber Vandalism Mirror Database. Penelitian diawali dengan analisis tingkat resiko keamanan menggunakan CVSS. Berdasarkan hasil analisis dilanjutkan dengan pengujian serangan meliputi SQL Injection, Cross Site Scripting, Broken Access Control, Unrestricted File Upload (Backdooring) serta defacing. Implementasi secure code dilakukan dengan
APA, Harvard, Vancouver, ISO, and other styles
3

Luo, Jian, Kueiming Lo, and Haoran Qu. "A Software Vulnerability Rating Approach Based on the Vulnerability Database." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/932397.

Full text
Abstract:
CVSS is a specification for measuring the relative severity of software vulnerabilities. The performance values of the CVSS given by CVSS-SIG cannot describe the reasons for the software vulnerabilities. This approach fails to distinguish between software vulnerabilities that have the same score but different levels of severity. In this paper, a software vulnerability rating approach (SVRA) is proposed. The vulnerability database is used by SVRA to analyze the frequencies of CVSS’s metrics at different times. Then, the equations for both exploitability and impact subscores are given in terms o
APA, Harvard, Vancouver, ISO, and other styles
4

Ouraou, Myriam. "Beyond the CVSS: Rethinking the Contextualisation of CVEs in a Connected World." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 490–500. https://doi.org/10.34190/eccws.24.1.3529.

Full text
Abstract:
In the context of globalized information technology, managing the growing number of Common Vulnerability Exposures (CVE) has become one of the most complex challenges for security teams. CVEs affect everyone: whether you are Microsoft Corporation, a national government, or an ordinary global citizen, no one is immune. The burden on cybersecurity entities is now heavier than ever. The more diverse assets a system holds, the broader its monitoring scope must be. Therefore, to avoid overwhelming operational and security teams, it is crucial to adapt the contextualization of CVEs to address emergi
APA, Harvard, Vancouver, ISO, and other styles
5

Khazaei, Atefeh, Mohammad Ghasemzadeh, and Vali Derhami. "An automatic method for CVSS score prediction using vulnerabilities description." Journal of Intelligent & Fuzzy Systems 30, no. 1 (2015): 89–96. http://dx.doi.org/10.3233/ifs-151733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Davlatov, Sh R., and P. V. Kuchinsky,. "Web resource security analysis based on CVSS metrics." Informatics 17, no. 3 (2020): 72–77. http://dx.doi.org/10.37661/1816-0301-2020-17-3-72-77.

Full text
Abstract:
Based on the analysis of vulnerability data for web resources and the CVSS metric, the distribution of the average CVSS (Common Vulnerability Scoring System standard for calculating a numerical vulnerability score on a ten-point scale) score for the websites of theRepublicofBelaruswas studied. The hypothesis on the distribution of the CVSS vulnerability assessment according to Poisson's law was tested by chi-square criteria. It was found that about 10% of web resources from the original general of samples of 19000 size have a critical averaged assessment level of vulnerability. As part of this
APA, Harvard, Vancouver, ISO, and other styles
7

Dimitris Koutras, Panayiotis Kotzanikolaou, Evangelos Paklatzis, Christos Grigoriadis, and Christos Douligeris. "A framework for automating environmental vulnerability analysis of network services." ITU Journal on Future and Evolving Technologies 5, no. 1 (2024): 104–19. http://dx.doi.org/10.52953/tbfn5500.

Full text
Abstract:
The primary objective of this paper is to introduce a comprehensive framework designed to automate the assessment of environmental vulnerability status of communication protocols and networked services, within operational contexts. The proposed algorithm leverages the Common Vulnerability Scoring System version 3 (CVSS 3) metrics in conjunction with network security data. The initial step involves the establishment of a network security ontology, which serves to model the environmental attributes associated with the current security posture of communication protocol channels available within a
APA, Harvard, Vancouver, ISO, and other styles
8

Manai, Elyes, Mohamed Mejri, and Jaouhar Fattahi. "Helping CNAs Generate CVSS Scores Faster and More Confidently Using XAI." Applied Sciences 14, no. 20 (2024): 9231. http://dx.doi.org/10.3390/app14209231.

Full text
Abstract:
The number of cybersecurity vulnerabilities keeps growing every year. Each vulnerability must be reported to the MITRE Corporation and assessed by a Counting Number Authority, which generates a metrics vector that determines its severity score. This process can take up to several weeks, with higher-severity vulnerabilities taking more time. Several authors have successfully used Deep Learning to automate the score generation process and used explainable AI to build trust with the users. However, the explanations that were shown were surface label input saliency on binary classification. This i
APA, Harvard, Vancouver, ISO, and other styles
9

Mishchenko, Maksym V., and Mariia S. Dorosh. "An expert system of recommendations for combating cyber threats using CVSS metrics and game theory." Herald of Advanced Information Technology 7, no. 3 (2024): 284–95. http://dx.doi.org/10.15276/hait.07.2024.20.

Full text
Abstract:
This study is focused on the creation of an expert system for generating recommendations on cyber security. The developed expert system uses a game-theoretic model as a inference engine to transform expert knowledge into recommendations for end-users, who may be chief IT security officers (CISOs), system administrators, or cyber security engineers. Expert knowledge is presented in the form of an estimate of the base group of CVSS metrics - Common Vulnerability Score System, for each type of attack and adjusted values of CVSS in the case that the counterattack strategy is applied. Given a set o
APA, Harvard, Vancouver, ISO, and other styles
10

Basya, Fahmi, Mardi Hardjanto, and Ikbal Permana Putra. "SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)." Buana Information Technology and Computer Sciences (BIT and CS) 3, no. 1 (2022): 1–4. http://dx.doi.org/10.36805/bit-cs.v3i1.2046.

Full text
Abstract:
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi. This study uses the Vulnerability Assessment and Penetration Testing (VAPT) method, which combines two forms of vulnerability testing to achieve a much more complete vulnerability analysis by performing different tasks in the same focus area. The vulnerability assessment uses the Common Vulnerability Scoring System (CVSS) method. The resu
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "CVSS score"

1

Cheng, Pengsu. "A Multi-Faceted Approach to Network Security Metric through Combining CVSS Base Scores." Thesis, 2011. http://spectrum.library.concordia.ca/35769/1/Cheng_MASc_F2011.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "CVSS score"

1

Younis, Awad, Yashwant K. Malaiya, and Indrajit Ray. "Evaluating CVSS Base Score Using Vulnerability Rewards Programs." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-33630-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohsen, Fadi, Adel Shtayyeh, Riham Naser, Lena Mohammad, and Marten Struijk. "Extending the Exposure Score of Web Browsers by Incorporating CVSS." In Lecture Notes in Computer Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-02067-4_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nowak, Maciej, Michał Walkowski, and Sławomir Sujecki. "Machine Learning Algorithms for Conversion of CVSS Base Score from 2.0 to 3.x." In Computational Science – ICCS 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77967-2_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cheng, Pengsu, Lingyu Wang, Sushil Jajodia, and Anoop Singhal. "Refining CVSS-Based Network Security Metrics by Examining the Base Scores." In Network Security Metrics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frigault, Marcel, Lingyu Wang, Sushil Jajodia, and Anoop Singhal. "Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks." In Network Security Metrics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Njarui, D. M. G., M. Gatheru, and S. R. Ghimire. "Brachiaria Grass for Climate Resilient and Sustainable Livestock Production in Kenya." In African Handbook of Climate Change Adaptation. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-45106-6_146.

Full text
Abstract:
AbstractBrachiaria grass is a “climate smart” forage that produces high amount of palatable and nutritious biomass for livestock and performs well in infertile soils, sequesters carbon in soil, and provides several environmental benefits. The objective of the study was to validate the productivity of Brachiaria grass and upscale the suitable cultivars for improved livestock feed resources in Kenya. We assume integrating Brachiaria grass into mixed crop-livestock system will enhance feed availability and livestock productivity, leading to increased food and nutrition security. Farmer participat
APA, Harvard, Vancouver, ISO, and other styles
7

Watkins, Lanier, and John S. Hurley. "The Next Generation of Scientific-Based Risk Metrics." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch099.

Full text
Abstract:
One of the major challenges to an organization achieving a certain level of preparedness to “effectively” combat existing and future cyber threats and vulnerabilities is its ability to ensure the security and reliability of its networks. Most of the existing efforts are quantitative, by nature, and limited solely to the networks and systems of the organization. It would be unfair to not acknowledge that for sure some progress has been achieved in the way that organizations, as a whole, are now positioning themselves to address the threats (GAO 2012). Unfortunately, so have the skill sets and r
APA, Harvard, Vancouver, ISO, and other styles
8

Gandham, Sreedevi, Ghali EN Hanuma Kumar, and Balaji Meriga. "Nutraceuticals: The Potential Agents to Rescue Human Race from Cardiovascular Diseases (CVDs)." In Advancements in Cardiovascular Research and Therapeutics: Molecular and Nutraceutical Perspectives. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/9789815050837122010010.

Full text
Abstract:
Cardiovascular disease(CVD) is the foremost global health problem that accounts for the highest rate of morbidity, mortality and huge healthcare costs. Food habits and lifestyles predominantly affect the functioning of the cardiovascular system either directly or indirectly through risk factors like hypertension, obesity, dyslipidemia, diabetes, etc. Decreased physical activity, increased sedentariness, and growing fast food culture are some of the apparent reasons that make the disease impact more on the younger generation. Several plant species have been reported in ethnomedicine for their t
APA, Harvard, Vancouver, ISO, and other styles
9

Sanjeevraddi. M. Satyaraddi, Preetham D, and Manimozhi R. "APACHE LOG4J VULNERABILITY." In INFORMATION TECHNOLOGY & BIOINFORMATICS: INTERNATIONAL CONFERENCE ON ADVANCE IT, ENGINEERING AND MANAGEMENT - SACAIM-2022 (VOL 1). REDSHINE India, 2020. http://dx.doi.org/10.25215/8119070682.06.

Full text
Abstract:
Apache Log4j2 is a widely used logging library for Java-based applications. In December 2021, several critical and severe software vulnerabilities, including CVE-2021-44228, were publicly disclosed, allowing remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure are far-reaching. The vulnerabilities potentially affect a wide range of Internet-of-Things (IoT) devices, embedded devices, and cyber-physical systems. In this paper, we explore the fundamental concepts of log4j and when these vul
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Wenming, Rui Zhai, and Fang Zuo. "A Vulnerability Threat Assessment Model Based on Bayesian Networks." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2023. http://dx.doi.org/10.3233/faia230850.

Full text
Abstract:
A The integration of information and network technology into industries has led to the widespread use of software. Unfortunately, these software designs may contain defects and vulnerabilities pose risks that could endanger safety. To ensure safety, it is essential to assess and analyze software vulnerabilities and implement adequate security measures. However, existing vulnerability assessment models cannot measure the severity of industrial software vulnerabilities which pose a significant challenge. To overcome this issue, a vulnerability threat assessment model for industrial software is p
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "CVSS score"

1

Miranda, Lucas, Lucas Senos, Daniel Menasché, et al. "Learning CNA-Oriented CVSS Scores." In 2024 IEEE 13th International Conference on Cloud Networking (CloudNet). IEEE, 2024. https://doi.org/10.1109/cloudnet62863.2024.10815736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miranda, Lucas, Lucas Senos, Daniel Menasché, et al. "A Product-Oriented Assessment of Vulnerability Severity Through NVD CVSS Scores." In 2025 International Conference on Computing, Networking and Communications (ICNC). IEEE, 2025. https://doi.org/10.1109/icnc64010.2025.10994117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Han, Rongrong Xi, and Li Zhao. "Study on the distribution of CVSS environmental score." In 2015 5th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 2015. http://dx.doi.org/10.1109/iceiec.2015.7284502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nowak, Maciej, Michal Walkowski, and Slawomir Sujecki. "Conversion of CVSS Base Score from 2.0 to 3.1." In 2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2021. http://dx.doi.org/10.23919/softcom52868.2021.9559092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vasireddy, Dinesh T., Dakota S. Dale, and Qinghua Li. "CVSS Base Score Prediction Using an Optimized Machine Learning Scheme." In 2023 Resilience Week (RWS). IEEE, 2023. http://dx.doi.org/10.1109/rws58133.2023.10284627.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Siqi, Minjie Cai, Mengyuan Zhang, Lianying Zhao, and Xavier de Carné de Carnavalet. "The Flaw Within: Identifying CVSS Score Discrepancies in the NVD." In 2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2023. http://dx.doi.org/10.1109/cloudcom59040.2023.00039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vasilyev, Vladimir, Anastasia Kirillova, Alexey Vulfin, and Andrey Nikonov. "Cybersecurity Risk Assessment Based on Cognitive Attack Vector Modeling with CVSS Score." In 2021 International Conference on Information Technology and Nanotechnology (ITNT). IEEE, 2021. http://dx.doi.org/10.1109/itnt52450.2021.9649191.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Balsam, Artur, Michał Walkowski, Maciej Nowak, Jacek Oko, and Sławomir Sujecki. "Automated Calculation of CVSS v3.1 Temporal Score Based on Apache Log4j 2021 Vulnerabilities." In 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2023. http://dx.doi.org/10.23919/softcom58365.2023.10271671.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rao, Parimi Mastan, and Prof Shekar Babu. "Prioritize Software Vulnerabilities by Classifying based on the CVSS score and Textual Description." In 1st Indian International Conference on Industrial Engineering and Operations Management. IEOM Society International, 2021. http://dx.doi.org/10.46254/in01.20210245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kioskli, Kitty, and Nineta Polemi. "Estimating Attackers’ Profiles Results in More Realistic Vulnerability Severity Scores." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002211.

Full text
Abstract:
Digitalization is moving at an increasing speed in all sectors of the economy. Along with it the cybersecurity threats and attacks continue to rise rapidly. Enterprises in all economic sectors are imposed to constantly assess the vulnerabilities (weaknesses) of their Information and Communication Systems (ICT) and further estimate their severity, to avoid exploitability by targeted cyber-attacks. Attacks may have catastrophic consequences (impacts), including the disruption or termination of operations, economic damages, long-term damaged reputation, customer loss, lawsuits, and fines. Organis
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "CVSS score"

1

A, Bengolea, García D, Balaciano G, Donato M, Donato M, and Iusef N. Alternativas farmacológicas para el tratamiento de pacientes con atrofia medular espinal. Epistemonikos Interactive Evidence Synthesis, 2024. http://dx.doi.org/10.30846/ies.dc6f192c69.

Full text
Abstract:
Objetivo El objetivo de esta revisión sistemática es evaluar el efecto de distintas alternativas terapéuticas (Nusinersen, Risdiplam, Onasemnogene Abeparvovec o su combinación) o su combinación, en el tratamiento de pacientes con atrofia medular espinal tipo 1, 2, 3 y 4. Métodos Se incluyeron ensayos clínicos aleatorizados y estudios observacionales que evaluaron el efecto de Nusinersen, Risdiplam, Onasemnogene Abeparvovec o su combinación. Se realizó una búsqueda amplia en la base de datos Epistemonikos, la cuál se construye mediante búsquedas periódicas en las siguientes fuentes para revisio
APA, Harvard, Vancouver, ISO, and other styles
2

A, Bengolea, García D, Balaciano G, Donato M, Donato M, and Iusef N. Alternativas farmacológicas para el tratamiento de pacientes con atrofia medular espinal. Epistemonikos Interactive Evidence Synthesis, 2023. http://dx.doi.org/10.30846/ies.dc6f192c69.v1.

Full text
Abstract:
Objetivo El objetivo de esta revisión sistemática es evaluar el efecto de distintas alternativas terapéuticas (Nusinersen, Risdiplam, Onasemnogene Abeparvovec o su combinación) o su combinación, en el tratamiento de pacientes con atrofia medular espinal tipo 1, 2, 3 y 4. Métodos Se incluyeron ensayos clínicos aleatorizados y estudios observacionales que evaluaron el efecto de Nusinersen, Risdiplam, Onasemnogene Abeparvovec o su combinación. Se realizó una búsqueda amplia en la base de datos Epistemonikos, la cuál se construye mediante búsquedas periódicas en las siguientes fuentes para revisio
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!