A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies
The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with enough information to improve protections against emerging cyberattack vectors and possible exploits. In this context, sev...
Saved in:
Published in | Journal of cybersecurity and privacy Vol. 4; no. 4; pp. 853 - 908 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Washington
MDPI AG
07.10.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 2624-800X 2624-800X |
DOI | 10.3390/jcp4040040 |
Cover
Abstract | The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with enough information to improve protections against emerging cyberattack vectors and possible exploits. In this context, several organizations adopt strategies to protect their data, technologies, and infrastructures from cyberattacks by implementing anticipatory and proactive approaches to their system security activities. To this end, vulnerability management systems play a crucial role in mitigating the impact of cyberattacks by identifying potential vulnerabilities within an organization and alerting cyber teams. However, the effectiveness of these systems, which employ multiple methods and techniques to identify weaknesses, relies heavily on the accuracy of published security events. For this reason, we introduce a discussion concerning existing vulnerability detection methods through an in-depth literature study of several research papers. Based on the results, this paper points out some issues related to vulnerability databases handling that impact the effectiveness of certain vulnerability identification methods. Furthermore, after summarizing the existing methodologies, this study classifies them into four approaches and discusses the challenges, findings, and potential research directions. |
---|---|
AbstractList | The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new security events with enough information to improve protections against emerging cyberattack vectors and possible exploits. In this context, several organizations adopt strategies to protect their data, technologies, and infrastructures from cyberattacks by implementing anticipatory and proactive approaches to their system security activities. To this end, vulnerability management systems play a crucial role in mitigating the impact of cyberattacks by identifying potential vulnerabilities within an organization and alerting cyber teams. However, the effectiveness of these systems, which employ multiple methods and techniques to identify weaknesses, relies heavily on the accuracy of published security events. For this reason, we introduce a discussion concerning existing vulnerability detection methods through an in-depth literature study of several research papers. Based on the results, this paper points out some issues related to vulnerability databases handling that impact the effectiveness of certain vulnerability identification methods. Furthermore, after summarizing the existing methodologies, this study classifies them into four approaches and discusses the challenges, findings, and potential research directions. |
Author | El Bouzekri El Idrissi, Younès Ait Aali, Nawal Sebai, Bechir Mahouachi, Dorra Bennouk, Khalid Faroukhi, Abou Zakaria |
Author_xml | – sequence: 1 givenname: Khalid orcidid: 0009-0004-8450-5424 surname: Bennouk fullname: Bennouk, Khalid – sequence: 2 givenname: Nawal orcidid: 0000-0002-9322-7225 surname: Ait Aali fullname: Ait Aali, Nawal – sequence: 3 givenname: Younès orcidid: 0000-0003-4018-437X surname: El Bouzekri El Idrissi fullname: El Bouzekri El Idrissi, Younès – sequence: 4 givenname: Bechir surname: Sebai fullname: Sebai, Bechir – sequence: 5 givenname: Abou Zakaria surname: Faroukhi fullname: Faroukhi, Abou Zakaria – sequence: 6 givenname: Dorra surname: Mahouachi fullname: Mahouachi, Dorra |
BookMark | eNptUdtKAzEQDaJgrX3xCxZ8E6rJJk2yj6XeChVBVHwQQjY7aVO2m5qklf69WysqIgxzOZw5M8wcof3GN4DQCcHnlBb4Ym6WDDPc2h7q5DxnfYnxy_6v_BD1YpxjjHNR0AFhHfQ6zEZ-sQwwgya6NWQPsHbwnummyoYxQowLaFLmbTbalBAimFVwaZM9r-oGgi5dva0uIYFJzjfZHaSZr3ztpw7iMTqwuo7Q-4pd9HR99Ti67U_ub8aj4aRvKCepr00lGC2hNJxLqwcaWyG5JCB4XlSCiJzgwjJRAjBCK0YsDDClLchlaWxJu2i80628nqtlcAsdNsprpz4BH6ZKh-RMDYowWeRkoCWWOausKYRmhgshWielzFut053WMvi3FcSk5n4VmnZ9RQkrOBUF2bLOdiwTfIwB7PdUgtX2GernGS0Z_yEbl_T2XCloV__X8gGlF438 |
CitedBy_id | crossref_primary_10_32604_cmc_2024_057587 |
Cites_doi | 10.1109/ICNC59896.2024.10555953 10.1016/j.iot.2023.100989 10.21203/rs.3.rs-4387414/v1 10.1109/TDSC.2021.3051525 10.3390/s22062126 10.1088/1742-6596/1827/1/012061 10.1007/s11227-016-1850-4 10.1145/24039.24041 10.1016/j.epsr.2022.107805 10.1186/s40537-024-00957-y 10.6028/NIST.SP.800-150 10.1080/0022250X.2001.9990249 10.1109/SecDev53368.2022.00028 10.1109/QRS-C51114.2020.00018 10.1016/j.procs.2018.05.082 10.1109/ICSE48619.2023.00191 10.1109/MINES.2012.202 10.1016/j.hcc.2024.100211 10.3390/app11104580 10.1016/j.scico.2012.06.002 10.1016/j.comcom.2010.04.006 10.1016/j.future.2019.05.041 10.6028/NIST.SP.800-61r2 10.1016/0096-0551(85)90018-9 10.1016/j.jss.2019.06.001 10.30534/ijatcse/2021/1581032021 10.1088/1742-6596/1395/1/012013 10.1016/j.cose.2022.102609 10.1109/SP.2017.62 10.3390/s22145105 10.1016/j.aiopen.2021.01.001 10.1145/3377024.3377026 10.1016/j.cose.2022.102823 10.6028/NIST.IR.7946 10.1016/j.cose.2021.102417 10.1145/3377811.3380364 10.6028/NIST.IR.8011-1 10.1109/DSN.2019.00056 10.24251/HICSS.2021.841 10.1016/j.compeleceng.2022.107716 10.3390/make6020050 10.1109/SSCI.2016.7849908 10.1145/3395363.3397385 10.1016/j.csa.2023.100031 10.1109/ICNC59896.2024.10556231 10.1016/j.cie.2019.106040 10.1109/ISSRE52982.2021.00054 10.3390/electronics12183927 10.1109/ICSE48619.2023.00188 10.3115/v1/D14-1179 10.1109/ICGS3.2019.8688018 10.1109/JIOT.2020.3042204 10.1145/3661167.3661176 10.1016/j.diin.2006.06.015 10.1016/j.procs.2024.04.294 10.1016/j.cose.2023.103256 10.1145/3510003.3510229 10.1111/1467-8551.00375 10.2478/jsiot-2022-0010 10.1145/3292500.3330989 10.1109/ICSE48619.2023.00192 10.1007/978-3-031-44355-8_12 10.1109/CAIN58948.2023.00026 10.1145/3395363.3397361 10.3390/electronics13050899 10.1145/2491845.2491871 10.1016/j.knosys.2022.110139 10.1017/S0269888912000331 10.1109/TSE.2022.3207149 10.3390/electronics13071191 10.3389/friot.2024.1306465 10.1109/IDAACS53288.2021.9660968 10.1145/3597926.3598037 10.6028/NIST.SP.800-18r1 10.1145/3379597.3387501 10.1007/s00500-022-07777-3 10.3390/app13169240 10.1109/ICSE48619.2023.00190 10.1007/978-3-031-37231-5_8 10.1016/j.array.2022.100209 10.1145/3468264.3468597 10.30574/ijsra.2024.11.1.0217 10.18653/v1/2024.acl-long.527 10.1109/SP.2014.44 10.1109/CCWC51732.2021.9376145 10.30656/jsmi.v4i1.2186 10.1109/PST.2016.7906965 10.1109/SP54263.2024.00210 10.1145/3276517 10.1016/j.jss.2022.111541 10.14722/ndss.2018.23158 10.1145/3597503.3639117 10.1007/978-3-030-48256-5_9 10.1109/TSE.2023.3286586 10.17487/rfc5646 10.1016/j.jss.2024.112031 10.1109/COMST.2021.3086296 10.5220/0012403500003648 10.1162/neco.1997.9.8.1735 10.1109/IALP.2018.8629225 10.1109/TIFS.2020.3044773 10.1109/TSE.2024.3470333 10.1007/s10462-023-10470-y 10.1007/978-3-030-12330-7 10.1108/IJWIS-06-2023-0089 10.1145/3607199.3607242 10.1109/CBD.2017.58 10.1145/3106237.3117771 10.1145/3639476.3639762 10.5220/0012060400003555 10.1109/ACCESS.2023.3298048 10.1109/ICACCI.2018.8554656 10.1145/1183236.1183264 10.1109/QRS-C60940.2023.00078 10.1109/ICMLA.2018.00120 10.6028/NIST.SP.800-34r1 10.1109/ACCESS.2021.3056407 10.3390/electronics11010016 10.1007/978-3-031-68738-9_34 10.1016/j.im.2020.103334 10.1145/3695988 10.1109/IACS.2017.7921992 10.1109/TSE.2021.3087402 10.1016/j.eswa.2019.112948 10.1007/s10844-017-0492-1 10.1016/S0377-2217(98)00364-6 10.1038/s41467-019-13055-y 10.1016/j.jss.2023.111832 10.1109/CNS48642.2020.9162309 10.1016/j.eswa.2020.114066 10.6028/NIST.SP.800-12r1 10.1016/j.cose.2023.103477 10.1016/j.cose.2019.03.010 10.1162/tacl_a_00104 10.1145/3524104 10.1109/ACCESS.2024.3422999 10.2139/ssrn.4853709 10.1145/3339252.3340522 10.1016/j.jss.2023.111623 10.1145/3465481.3470039 10.1145/3605098.3636003 10.1049/blc2.12046 10.6028/NIST.IR.7695 10.1016/j.future.2016.06.014 10.1109/TNNLS.2020.2978386 10.1007/978-1-4419-0140-8 10.1016/j.neunet.2018.07.011 10.3390/electronics9010144 10.1109/ACCESS.2024.3420741 10.1109/ICCWS48432.2020.9292388 10.3390/info13070322 10.3390/app9245364 10.30574/wjarr.2024.21.1.0315 10.3390/electronics11020198 10.2478/raft-2024-0010 10.1109/DSA52907.2021.00013 10.1016/j.heliyon.2024.e29917 10.6028/NIST.SP.1800-17 10.1109/MC.2012.286 10.18653/v1/D19-1410 10.1109/IJCNN48605.2020.9207304 10.1186/2192-113X-2-17 10.6028/NIST.SP.800-160v2r1 10.1109/NOMS47738.2020.9110460 10.1007/978-3-642-36583-6 10.6028/NIST.IR.7698 10.1007/978-3-319-93417-4_38 10.1007/978-3-030-52683-2_1 10.14722/ndss.2024.24346 10.1145/3641819 10.18653/v1/2021.emnlp-main.685 10.1016/j.eng.2018.01.004 10.1007/11554844_3 10.21203/rs.3.rs-3238552/v1 10.1145/3436877 10.1186/s13677-023-00574-9 10.1007/s00607-018-0646-1 10.1109/FIT.2017.00037 |
ContentType | Journal Article |
Copyright | 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 3V. 7WY 7WZ 7XB 87Z 8FK 8FL ABUWG AFKRA AZQEC BENPR BEZIV CCPQU DWQXO FRNLG F~G K60 K6~ L.- M0C PHGZM PHGZT PIMPY PKEHL PQBIZ PQBZA PQEST PQQKQ PQUKI PRINS Q9U DOA |
DOI | 10.3390/jcp4040040 |
DatabaseName | CrossRef ProQuest Central (Corporate) ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central Business Premium Collection ProQuest One ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest Business Collection ABI/INFORM Professional Advanced ABI/INFORM Collection (ProQuest) ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest Central Korea ProQuest Central (New) ABI/INFORM Complete (Alumni Edition) Business Premium Collection ABI/INFORM Global ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Business Collection ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
DatabaseTitleList | Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals (DOAJ) url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: BENPR name: ProQuest Central url: http://www.proquest.com/pqcentral?accountid=15518 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2624-800X |
EndPage | 908 |
ExternalDocumentID | oai_doaj_org_article_1489215a80824dfc97a4c6777c678882 10_3390_jcp4040040 |
GroupedDBID | 7WY 8FL AAYXX ABUWG AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BEZIV CCPQU CITATION DWQXO FRNLG GROUPED_DOAJ M0C MODMG M~E OK1 PHGZM PHGZT PIMPY PQBIZ PQBZA PUEGO 3V. 7XB 8FK AZQEC K60 K6~ L.- PKEHL PQEST PQQKQ PQUKI PRINS Q9U |
ID | FETCH-LOGICAL-c361t-acd743bebc668fa5a0f78681e7629d7172109f47bee413d41fe503310968bcfb3 |
IEDL.DBID | DOA |
ISSN | 2624-800X |
IngestDate | Wed Aug 27 01:20:58 EDT 2025 Mon Jun 30 13:27:56 EDT 2025 Wed Oct 01 01:28:12 EDT 2025 Thu Apr 24 23:01:53 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c361t-acd743bebc668fa5a0f78681e7629d7172109f47bee413d41fe503310968bcfb3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-9322-7225 0009-0004-8450-5424 0000-0003-4018-437X |
OpenAccessLink | https://doaj.org/article/1489215a80824dfc97a4c6777c678882 |
PQID | 3149637912 |
PQPubID | 5465940 |
PageCount | 56 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_1489215a80824dfc97a4c6777c678882 proquest_journals_3149637912 crossref_primary_10_3390_jcp4040040 crossref_citationtrail_10_3390_jcp4040040 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-10-07 |
PublicationDateYYYYMMDD | 2024-10-07 |
PublicationDate_xml | – month: 10 year: 2024 text: 2024-10-07 day: 07 |
PublicationDecade | 2020 |
PublicationPlace | Washington |
PublicationPlace_xml | – name: Washington |
PublicationTitle | Journal of cybersecurity and privacy |
PublicationYear | 2024 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | Sun (ref_11) 2023; 135 ref_137 ref_258 ref_93 ref_136 ref_257 ref_139 ref_91 ref_90 Tranfield (ref_12) 2003; 14 ref_250 ref_131 ref_252 Na (ref_47) 2018; 14 Obbink (ref_98) 2005; Volume 3714 ref_99 ref_130 ref_251 ref_254 ref_253 ref_96 ref_135 ref_256 ref_95 ref_134 ref_255 Galindo (ref_108) 2020; Volume B Cheng (ref_245) 2021; 30 Jiang (ref_260) 2022; 15 ref_126 ref_125 ref_128 ref_249 Shi (ref_80) 2024; 27 ref_127 ref_129 ref_120 ref_241 ref_122 ref_243 ref_242 ref_124 ref_123 ref_244 Buda (ref_140) 2018; 106 Sadlek (ref_238) 2022; 115 Ferrante (ref_63) 1987; 9 Hassan (ref_177) 2021; 9 Yao (ref_198) 2024; 4 ref_72 ref_71 ref_70 Koroniotis (ref_133) 2019; 100 Chakraborty (ref_94) 2022; 48 ref_76 ref_74 ref_157 ref_73 Zhang (ref_232) 2023; 206 Sun (ref_121) 2023; 73 Denz (ref_155) 2013; 2 ref_83 Rezaeibagha (ref_142) 2021; 8 ref_148 ref_82 ref_147 Sun (ref_248) 2021; 110 ref_149 Xiong (ref_218) 2019; 84 ref_89 ref_88 ref_141 ref_87 ref_144 ref_86 ref_143 ref_85 Manjunatha (ref_204) 2024; 235 ref_217 Okoli (ref_153) 2024; 21 ref_212 Zhao (ref_50) 2023; 260 Hochreiter (ref_113) 1997; 36 Sharma (ref_41) 2023; 129 ref_203 ref_205 ref_207 Belkina (ref_92) 2019; 10 Zhou (ref_56) 2020; 1 Nong (ref_160) 2023; 49 Dokeroglu (ref_158) 2019; 137 ref_201 ref_200 Abdusalomov (ref_182) 2024; 12 Chen (ref_240) 2020; 141 Zhang (ref_224) 2023; 49 ref_115 ref_114 ref_116 ref_237 Li (ref_152) 2020; 37 Guo (ref_156) 2022; 121 ref_239 Hu (ref_178) 2021; 1827 Liu (ref_39) 2011; 34 ref_230 ref_110 ref_231 ref_112 Jameil (ref_151) 2024; 12 Collet (ref_75) 2023; Volume 13927 ref_104 ref_225 ref_103 ref_227 ref_105 ref_226 ref_229 ref_228 ref_109 De (ref_79) 2022; 206 Azhagiri (ref_184) 2023; 16 Kiran (ref_246) 2021; 10 ref_102 ref_222 Amoo (ref_138) 2024; 11 Chiu (ref_111) 2016; 4 Benduhn (ref_219) 2014; 79 Syed (ref_209) 2020; 57 ref_14 ref_13 Kharat (ref_6) 2022; 9 Kornblum (ref_51) 2006; 3 Jia (ref_210) 2018; 4 Noonan (ref_57) 1985; 10 ref_18 ref_16 ref_15 Cosentino (ref_211) 2017; 49 Jones (ref_202) 2024; 29 Rodriguez (ref_185) 2021; 23 ref_25 ref_24 ref_23 ref_22 ref_21 ref_20 Brailsford (ref_101) 1999; 119 Hitesh (ref_221) 2018; 132 ref_29 ref_28 ref_27 ref_26 Lu (ref_84) 2024; 212 Liu (ref_165) 2023; 11 Stine (ref_19) 2008; 1 Admass (ref_146) 2024; 2 Li (ref_175) 2024; 6 Jiang (ref_77) 2013; 28 Bordes (ref_81) 2013; 2 (ref_233) 2023; 27 Wang (ref_55) 2021; 16 Sawyer (ref_213) 2012; 45 Galindo (ref_215) 2019; Volume A Thomas (ref_208) 2024; 20 Salem (ref_154) 2024; 11 Galindo (ref_100) 2019; 101 ref_58 ref_172 ref_174 ref_54 Tang (ref_164) 2023; 199 ref_53 ref_176 ref_52 Li (ref_62) 2022; 19 ref_179 Qu (ref_119) 2023; 55 Felfernig (ref_214) 2018; 51 ref_180 Zou (ref_223) 2019; 18 Singh (ref_145) 2019; 75 ref_181 Yuan (ref_235) 2024; 81 Wu (ref_59) 2019; 32 ref_61 Russo (ref_173) 2019; 156 ref_60 ref_169 Tariq (ref_132) 2024; 10 Li (ref_247) 2019; 1395 ref_69 ref_162 ref_68 ref_161 ref_67 Agrawal (ref_206) 2021; 9 ref_66 ref_163 ref_65 ref_166 ref_64 ref_168 ref_167 Maurice (ref_10) 2020; Volume 12223 ref_171 Brandes (ref_78) 2001; 25 Borrego (ref_107) 2023; 195 ref_36 ref_195 ref_35 ref_194 ref_34 ref_197 ref_33 ref_196 ref_32 ref_199 ref_31 Zamojski (ref_259) 2020; Volume 1173 ref_30 Kwak (ref_117) 2021; 166 ref_38 ref_37 Mihoub (ref_118) 2022; 98 Hussan (ref_170) 2022; 2022 Blanco (ref_220) 2023; 24 ref_46 ref_183 ref_45 ref_186 ref_44 ref_43 ref_188 ref_42 ref_187 Gasca (ref_106) 2020; Volume A ref_40 ref_189 ref_1 ref_3 ref_2 Costa (ref_216) 2018; 80 Isniah (ref_17) 2020; 4 ref_191 ref_190 ref_49 ref_193 Gong (ref_234) 2023; 3 ref_48 Long (ref_150) 2024; 13 Rajwar (ref_159) 2023; 56 ref_192 Pradel (ref_236) 2018; 2 ref_9 ref_8 ref_5 Batory (ref_97) 2006; 49 ref_4 ref_7 |
References_xml | – ident: ref_9 – ident: ref_53 doi: 10.1109/ICNC59896.2024.10555953 – volume: 24 start-page: 100989 year: 2023 ident: ref_220 article-title: Onto-CARMEN: Ontology-Driven Approach for Cyber–Physical System Security Requirements Meta-Modelling and Reasoning publication-title: Internet Things doi: 10.1016/j.iot.2023.100989 – ident: ref_157 doi: 10.21203/rs.3.rs-4387414/v1 – volume: 19 start-page: 2244 year: 2022 ident: ref_62 article-title: SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities publication-title: IEEE Trans. Dependable Secur. Comput. doi: 10.1109/TDSC.2021.3051525 – ident: ref_68 doi: 10.3390/s22062126 – ident: ref_65 – ident: ref_88 – volume: 1827 start-page: 012061 year: 2021 ident: ref_178 article-title: Web Application Vulnerability Detection Method Based on Machine Learning publication-title: J. Phys. Conf. Ser. doi: 10.1088/1742-6596/1827/1/012061 – volume: 75 start-page: 4543 year: 2019 ident: ref_145 article-title: A Comprehensive Study on APT Attacks and Countermeasures for Future Networks and Communications: Challenges and Solutions publication-title: J. Supercomput. doi: 10.1007/s11227-016-1850-4 – volume: 9 start-page: 319 year: 1987 ident: ref_63 article-title: The Program Dependence Graph and Its Use in Optimization publication-title: ACM Trans. Program. Lang. Syst. doi: 10.1145/24039.24041 – ident: ref_71 – volume: 206 start-page: 107805 year: 2022 ident: ref_79 article-title: A PMU Assisted Cyber Attack Resilient Framework against Power Systems Structural Vulnerabilities publication-title: Electr. Power Syst. Res. doi: 10.1016/j.epsr.2022.107805 – volume: 11 start-page: 105 year: 2024 ident: ref_154 article-title: Advancing Cybersecurity: A Comprehensive Review of AI-Driven Detection Techniques publication-title: J. Big Data doi: 10.1186/s40537-024-00957-y – ident: ref_28 doi: 10.6028/NIST.SP.800-150 – ident: ref_120 – volume: 25 start-page: 163 year: 2001 ident: ref_78 article-title: A Faster Algorithm for Betweenness Centrality* publication-title: J. Math. Sociol. doi: 10.1080/0022250X.2001.9990249 – ident: ref_83 – ident: ref_212 – ident: ref_258 – ident: ref_242 doi: 10.1109/SecDev53368.2022.00028 – volume: 1 start-page: 53 year: 2008 ident: ref_19 article-title: Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories publication-title: Spec. Publ. 800-60 Revis. 1 – ident: ref_230 doi: 10.1109/QRS-C51114.2020.00018 – volume: 132 start-page: 1477 year: 2018 ident: ref_221 article-title: Feature Selection Optimization in SPL Using Genetic Algorithm publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2018.05.082 – ident: ref_58 doi: 10.1109/ICSE48619.2023.00191 – volume: 37 start-page: 50 year: 2020 ident: ref_152 article-title: Federated Learning: Challenges, Methods, and Future Directions publication-title: IEEE Signal Process. Mag. – volume: 81 start-page: 103718 year: 2024 ident: ref_235 article-title: Software Vulnerable Functions Discovery Based on Code Composite Feature publication-title: J. Inf. Secur. Appl. – ident: ref_3 – ident: ref_45 doi: 10.1109/MINES.2012.202 – ident: ref_115 – ident: ref_228 – volume: 4 start-page: 100211 year: 2024 ident: ref_198 article-title: A Survey on Large Language Model (LLM) Security and Privacy: The Good, The Bad, and The Ugly publication-title: High-Confid. Comput. doi: 10.1016/j.hcc.2024.100211 – ident: ref_148 doi: 10.3390/app11104580 – volume: 79 start-page: 70 year: 2014 ident: ref_219 article-title: FeatureIDE: An Extensible Framework for Feature-Oriented Software Development publication-title: Sci. Comput. Program. doi: 10.1016/j.scico.2012.06.002 – volume: 34 start-page: 264 year: 2011 ident: ref_39 article-title: VRSS: A New System for Rating and Scoring Vulnerabilities publication-title: Comput. Commun. doi: 10.1016/j.comcom.2010.04.006 – volume: 100 start-page: 779 year: 2019 ident: ref_133 article-title: Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.05.041 – ident: ref_205 – volume: 9 start-page: 976 year: 2022 ident: ref_6 article-title: Vulnerability Management System publication-title: Int. Res. J. Eng. Technol. – ident: ref_24 doi: 10.6028/NIST.SP.800-61r2 – volume: 10 start-page: 225 year: 1985 ident: ref_57 article-title: An Algorithm for Generating Abstract Syntax Trees publication-title: Comput. Lang. doi: 10.1016/0096-0551(85)90018-9 – ident: ref_200 – volume: 156 start-page: 84 year: 2019 ident: ref_173 article-title: Summarizing Vulnerabilities’ Descriptions to Support Experts during Vulnerability Assessment Activities publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2019.06.001 – volume: 10 start-page: 2637 year: 2021 ident: ref_246 article-title: Categorization of CVE Based on Vulnerability Software By Using Machine Learning Techniques publication-title: Int. J. Adv. Trends Comput. Sci. Eng. doi: 10.30534/ijatcse/2021/1581032021 – volume: Volume A start-page: 265 year: 2019 ident: ref_215 article-title: Process Mining to Unleash Variability Management: Discovering Configuration Workflows Using Logs publication-title: Proceedings of the 23rd International Systems and Software Product Line Conference – volume: 1395 start-page: 012013 year: 2019 ident: ref_247 article-title: Detection of SQL Injection Attacks Based on Improved TFIDF Algorithm publication-title: J. Phys. Conf. Ser. doi: 10.1088/1742-6596/1395/1/012013 – ident: ref_89 – volume: 115 start-page: 102609 year: 2022 ident: ref_238 article-title: CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling publication-title: Comput. Secur. doi: 10.1016/j.cose.2022.102609 – ident: ref_126 – ident: ref_249 doi: 10.1109/SP.2017.62 – ident: ref_36 – ident: ref_70 – ident: ref_95 – ident: ref_147 doi: 10.3390/s22145105 – volume: 1 start-page: 57 year: 2020 ident: ref_56 article-title: Graph Neural Networks: A Review of Methods and Applications publication-title: AI Open doi: 10.1016/j.aiopen.2021.01.001 – ident: ref_104 doi: 10.1145/3377024.3377026 – ident: ref_26 – volume: 121 start-page: 102823 year: 2022 ident: ref_156 article-title: HyVulDect: A Hybrid Semantic Vulnerability Mining System Based on Graph Neural Network publication-title: Comput. Secur. doi: 10.1016/j.cose.2022.102823 – ident: ref_25 doi: 10.6028/NIST.IR.7946 – ident: ref_127 – volume: 110 start-page: 102417 year: 2021 ident: ref_248 article-title: VDSimilar: Vulnerability Detection Based on Code Similarity of Vulnerabilities and Patches publication-title: Comput. Secur. doi: 10.1016/j.cose.2021.102417 – ident: ref_134 doi: 10.1145/3377811.3380364 – ident: ref_29 doi: 10.6028/NIST.IR.8011-1 – ident: ref_254 doi: 10.1109/DSN.2019.00056 – ident: ref_251 doi: 10.24251/HICSS.2021.841 – ident: ref_8 – volume: 98 start-page: 107716 year: 2022 ident: ref_118 article-title: Denial of Service Attack Detection and Mitigation for Internet of Things Using Looking-Back-Enabled Machine Learning Techniques publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2022.107716 – volume: 6 start-page: 1087 year: 2024 ident: ref_175 article-title: Assessment of Software Vulnerability Contributing Factors by Model-Agnostic Explainable AI publication-title: Mach. Learn. Knowl. Extr. doi: 10.3390/make6020050 – ident: ref_239 doi: 10.1109/SSCI.2016.7849908 – ident: ref_87 – ident: ref_136 doi: 10.1145/3395363.3397385 – volume: 2 start-page: 100031 year: 2024 ident: ref_146 article-title: Cyber Security: State of the Art, Challenges and Future Directions publication-title: Cyber Secur. Appl. doi: 10.1016/j.csa.2023.100031 – ident: ref_38 – ident: ref_52 doi: 10.1109/ICNC59896.2024.10556231 – volume: 137 start-page: 106040 year: 2019 ident: ref_158 article-title: A Survey on New Generation Metaheuristic Algorithms publication-title: Comput. Ind. Eng. doi: 10.1016/j.cie.2019.106040 – ident: ref_61 doi: 10.1109/ISSRE52982.2021.00054 – ident: ref_110 – ident: ref_72 – ident: ref_180 doi: 10.3390/electronics12183927 – ident: ref_191 doi: 10.1109/ICSE48619.2023.00188 – ident: ref_60 doi: 10.3115/v1/D14-1179 – ident: ref_7 – volume: 9 start-page: 702 year: 2021 ident: ref_177 article-title: SQL Injection Vulnerability Detection Using Deep Learning: A Feature-Based Approach publication-title: Indones. J. Electr. Eng. Inform. IJEEI – ident: ref_253 doi: 10.1109/ICGS3.2019.8688018 – volume: 8 start-page: 8056 year: 2021 ident: ref_142 article-title: Secure and Efficient Data Aggregation for IoT Monitoring Systems publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3042204 – ident: ref_225 doi: 10.1145/3661167.3661176 – volume: 3 start-page: 91 year: 2006 ident: ref_51 article-title: Identifying Almost Identical Files Using Context Triggered Piecewise Hashing publication-title: Digit. Investig. doi: 10.1016/j.diin.2006.06.015 – ident: ref_82 – volume: 235 start-page: 3105 year: 2024 ident: ref_204 article-title: CVE Severity Prediction from Vulnerability Description—A Deep Learning Approach publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2024.04.294 – volume: 129 start-page: 103256 year: 2023 ident: ref_41 article-title: A Hybrid Scoring System for Prioritization of Software Vulnerabilities publication-title: Comput. Secur. doi: 10.1016/j.cose.2023.103256 – ident: ref_85 doi: 10.1145/3510003.3510229 – ident: ref_37 – ident: ref_21 – volume: 14 start-page: 207 year: 2003 ident: ref_12 article-title: Towards a Methodology for Developing Evidence-Informed Management Knowledge by Means of Systematic Review publication-title: Br. J. Manag. doi: 10.1111/1467-8551.00375 – volume: 2022 start-page: 146 year: 2022 ident: ref_170 article-title: Optimal Deep Belief Network Enabled Vulnerability Detection on Smart Environment publication-title: J. Smart Internet Things doi: 10.2478/jsiot-2022-0010 – ident: ref_243 doi: 10.1145/3292500.3330989 – ident: ref_167 – ident: ref_162 doi: 10.1109/ICSE48619.2023.00192 – volume: Volume 13927 start-page: 167 year: 2023 ident: ref_75 article-title: On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics publication-title: Complex Computational Ecosystems doi: 10.1007/978-3-031-44355-8_12 – ident: ref_116 – ident: ref_189 – volume: 2 start-page: 2787 year: 2013 ident: ref_81 article-title: Translating Embeddings for Modeling Multi-Relational Data publication-title: Proc. 26th Int. Conf. Neural Inf. Process. Syst. – ident: ref_143 doi: 10.1109/CAIN58948.2023.00026 – ident: ref_122 – ident: ref_2 – volume: 18 start-page: 2224 year: 2019 ident: ref_223 article-title: μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection publication-title: IEEE Trans. Dependable Secur. Comput. – ident: ref_49 doi: 10.1145/3395363.3397361 – ident: ref_207 doi: 10.3390/electronics13050899 – ident: ref_40 doi: 10.1145/2491845.2491871 – ident: ref_195 – ident: ref_15 – ident: ref_43 – volume: 260 start-page: 110139 year: 2023 ident: ref_50 article-title: VULDEFF: Vulnerability Detection Method Based on Function Fingerprints and Code Differences publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2022.110139 – ident: ref_105 – volume: 28 start-page: 75 year: 2013 ident: ref_77 article-title: A Survey of Frequent Subgraph Mining Algorithms publication-title: Knowl. Eng. Rev. doi: 10.1017/S0269888912000331 – volume: 49 start-page: 1983 year: 2023 ident: ref_160 article-title: Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.2022.3207149 – ident: ref_4 doi: 10.3390/electronics13071191 – ident: ref_86 doi: 10.3389/friot.2024.1306465 – ident: ref_5 doi: 10.1109/IDAACS53288.2021.9660968 – ident: ref_74 – ident: ref_163 doi: 10.1145/3597926.3598037 – ident: ref_13 doi: 10.6028/NIST.SP.800-18r1 – ident: ref_96 doi: 10.1145/3379597.3387501 – volume: 27 start-page: 5703 year: 2023 ident: ref_233 article-title: Semantic-Based Vulnerability Detection by Functional Connectivity of Gated Graph Sequence Neural Networks publication-title: Soft Comput. doi: 10.1007/s00500-022-07777-3 – ident: ref_229 doi: 10.3390/app13169240 – ident: ref_16 – ident: ref_168 doi: 10.1109/ICSE48619.2023.00188 – ident: ref_166 doi: 10.1109/ICSE48619.2023.00190 – ident: ref_1 – ident: ref_123 – ident: ref_226 doi: 10.1007/978-3-031-37231-5_8 – volume: 15 start-page: 100209 year: 2022 ident: ref_260 article-title: Towards Automatic Discovery and Assessment of Vulnerability Severity in Cyber–Physical Systems publication-title: Array doi: 10.1016/j.array.2022.100209 – ident: ref_174 doi: 10.1145/3468264.3468597 – volume: 11 start-page: 1304 year: 2024 ident: ref_138 article-title: Cybersecurity Threats in the Age of IoT: A Review of Protective Measures publication-title: Int. J. Sci. Res. Arch. doi: 10.30574/ijsra.2024.11.1.0217 – ident: ref_169 – ident: ref_257 doi: 10.18653/v1/2024.acl-long.527 – ident: ref_64 doi: 10.1109/SP.2014.44 – ident: ref_27 – ident: ref_244 – ident: ref_135 – ident: ref_231 doi: 10.1109/CCWC51732.2021.9376145 – volume: 4 start-page: 72 year: 2020 ident: ref_17 article-title: Plan Do Check Action (PDCA) Method: Literature Review and Research Issues publication-title: J. Sist. Dan Manaj. Ind. doi: 10.30656/jsmi.v4i1.2186 – volume: 16 start-page: 1213 year: 2023 ident: ref_184 article-title: An Intrusion Detection System Using Ranked Feature Bagging publication-title: Int. J. Inf. Technol. – volume: 14 start-page: 740 year: 2018 ident: ref_47 article-title: Service Identification of Internet-Connected Devices Based on Common Platform Enumeration publication-title: J. Inf. Process. Syst. – ident: ref_193 – ident: ref_255 doi: 10.1109/PST.2016.7906965 – ident: ref_187 – ident: ref_197 doi: 10.1109/SP54263.2024.00210 – volume: 2 start-page: 1 year: 2018 ident: ref_236 article-title: DeepBugs: A Learning Approach to Name-Based Bug Detection publication-title: Proc. ACM Program. Lang. doi: 10.1145/3276517 – volume: 195 start-page: 111541 year: 2023 ident: ref_107 article-title: Feature Models to Boost the Vulnerability Management Process publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2022.111541 – ident: ref_109 doi: 10.14722/ndss.2018.23158 – volume: 73 start-page: 103423 year: 2023 ident: ref_121 article-title: ASSBert: Active and Semi-Supervised Bert for Smart Contract Vulnerability Detection publication-title: J. Inf. Secur. Appl. – ident: ref_67 – ident: ref_129 – ident: ref_201 doi: 10.1145/3597503.3639117 – ident: ref_44 – volume: Volume 1173 start-page: 82 year: 2020 ident: ref_259 article-title: CVE Based Classification of Vulnerable IoT Systems publication-title: Theory and Applications of Dependable Computer Systems doi: 10.1007/978-3-030-48256-5_9 – volume: 49 start-page: 4196 year: 2023 ident: ref_224 article-title: Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.2023.3286586 – ident: ref_32 doi: 10.17487/rfc5646 – volume: 212 start-page: 112031 year: 2024 ident: ref_84 article-title: GRACE: Empowering LLM-Based Software Vulnerability Detection with Graph Structure and in-Context Learning publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2024.112031 – ident: ref_73 – volume: 23 start-page: 1920 year: 2021 ident: ref_185 article-title: A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2021.3086296 – ident: ref_250 doi: 10.5220/0012403500003648 – volume: 36 start-page: 1735 year: 1997 ident: ref_113 article-title: Long Short-Term Memory publication-title: Neural Comput. doi: 10.1162/neco.1997.9.8.1735 – ident: ref_112 doi: 10.1109/IALP.2018.8629225 – volume: 16 start-page: 1943 year: 2021 ident: ref_55 article-title: Combining Graph-Based Learning with Automated Data Collection for Code Vulnerability Detection publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2020.3044773 – ident: ref_33 – ident: ref_190 doi: 10.1109/TSE.2024.3470333 – volume: 56 start-page: 13187 year: 2023 ident: ref_159 article-title: An Exhaustive Review of the Metaheuristic Algorithms for Search and Optimization: Taxonomy, Applications, and Open Challenges publication-title: Artif. Intell. Rev. doi: 10.1007/s10462-023-10470-y – ident: ref_199 – ident: ref_144 doi: 10.1007/978-3-030-12330-7 – volume: 20 start-page: 66 year: 2024 ident: ref_208 article-title: DoS Attack Detection Using Aquila Deer Hunting Optimization Enabled Deep Belief Network publication-title: Int. J. Web Inf. Syst. doi: 10.1108/IJWIS-06-2023-0089 – volume: Volume A start-page: 1 year: 2020 ident: ref_106 article-title: AMADEUS: Towards the AutoMAteD secUrity teSting publication-title: Proceedings of the 24th ACM Conference on Systems and Software Product Line – ident: ref_161 doi: 10.1145/3607199.3607242 – ident: ref_22 – ident: ref_256 – ident: ref_241 doi: 10.1109/CBD.2017.58 – ident: ref_172 doi: 10.1145/3106237.3117771 – ident: ref_188 doi: 10.1145/3639476.3639762 – ident: ref_141 doi: 10.5220/0012060400003555 – volume: 11 start-page: 77990 year: 2023 ident: ref_165 article-title: A Smart Contract Vulnerability Detection Mechanism Based on Deep Learning and Expert Rules publication-title: IEEE Access doi: 10.1109/ACCESS.2023.3298048 – ident: ref_217 doi: 10.1109/ICACCI.2018.8554656 – volume: 49 start-page: 45 year: 2006 ident: ref_97 article-title: Automated Analysis of Feature Models publication-title: Commun. ACM doi: 10.1145/1183236.1183264 – ident: ref_227 doi: 10.1109/QRS-C60940.2023.00078 – ident: ref_171 doi: 10.1109/ICMLA.2018.00120 – ident: ref_42 doi: 10.6028/NIST.SP.800-34r1 – volume: 9 start-page: 26766 year: 2021 ident: ref_206 article-title: Metaheuristic Algorithms on Feature Selection: A Survey of One Decade of Research (2009–2019) publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3056407 – ident: ref_139 doi: 10.3390/electronics11010016 – ident: ref_196 doi: 10.1007/978-3-031-68738-9_34 – ident: ref_90 – volume: 57 start-page: 103334 year: 2020 ident: ref_209 article-title: Cybersecurity Vulnerability Management: A Conceptual Ontology and Cyber Intelligence Alert System publication-title: Inf. Manag. doi: 10.1016/j.im.2020.103334 – ident: ref_128 doi: 10.1145/3695988 – ident: ref_46 doi: 10.1109/IACS.2017.7921992 – volume: Volume B start-page: 52 year: 2020 ident: ref_108 article-title: A Python Framework for the Automated Analysis of Feature Models: A First Step to Integrate Community Efforts publication-title: Proceedings of the 24th ACM International Systems and Software Product Line Conference – ident: ref_35 – volume: 48 start-page: 3280 year: 2022 ident: ref_94 article-title: Deep Learning Based Vulnerability Detection: Are We There Yet? publication-title: IEEE Trans. Softw. Eng. doi: 10.1109/TSE.2021.3087402 – volume: 141 start-page: 112948 year: 2020 ident: ref_240 article-title: A Review: Knowledge Reasoning over Knowledge Graph publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2019.112948 – volume: 51 start-page: 161 year: 2018 ident: ref_214 article-title: Anytime Diagnosis for Reconfiguration publication-title: J. Intell. Inf. Syst. doi: 10.1007/s10844-017-0492-1 – volume: 119 start-page: 557 year: 1999 ident: ref_101 article-title: Constraint Satisfaction Problems: Algorithms and Applications publication-title: Eur. J. Oper. Res. doi: 10.1016/S0377-2217(98)00364-6 – volume: 10 start-page: 5415 year: 2019 ident: ref_92 article-title: Automated Optimized Parameters for T-Distributed Stochastic Neighbor Embedding Improve Visualization and Analysis of Large Datasets publication-title: Nat. Commun. doi: 10.1038/s41467-019-13055-y – volume: 206 start-page: 111832 year: 2023 ident: ref_232 article-title: Static Vulnerability Detection Based on Class Separation publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2023.111832 – ident: ref_176 doi: 10.1109/CNS48642.2020.9162309 – volume: 166 start-page: 114066 year: 2021 ident: ref_117 article-title: Cosine Similarity Based Anomaly Detection Methodology for the CAN Bus publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2020.114066 – ident: ref_23 doi: 10.6028/NIST.SP.800-12r1 – volume: 135 start-page: 103477 year: 2023 ident: ref_11 article-title: Inconsistent Measurement and Incorrect Detection of Software Names in Security Vulnerability Reports publication-title: Comput. Secur. doi: 10.1016/j.cose.2023.103477 – volume: 84 start-page: 53 year: 2019 ident: ref_218 article-title: Threat Modeling—A Systematic Literature Review publication-title: Comput. Secur. doi: 10.1016/j.cose.2019.03.010 – ident: ref_69 – volume: 4 start-page: 357 year: 2016 ident: ref_111 article-title: Named Entity Recognition with Bidirectional LSTM-CNNs publication-title: Trans. Assoc. Comput. Linguist. doi: 10.1162/tacl_a_00104 – volume: 55 start-page: 1 year: 2023 ident: ref_119 article-title: Blockchain-Enabled Federated Learning: A Survey publication-title: ACM Comput. Surv. doi: 10.1145/3524104 – volume: 12 start-page: 117761 year: 2024 ident: ref_182 article-title: Optimizing Smart Home Intrusion Detection with Harmony-Enhanced Extra Trees publication-title: IEEE Access doi: 10.1109/ACCESS.2024.3422999 – ident: ref_203 doi: 10.2139/ssrn.4853709 – ident: ref_237 doi: 10.1145/3339252.3340522 – ident: ref_131 – volume: 199 start-page: 111623 year: 2023 ident: ref_164 article-title: CSGVD: A Deep Learning Approach Combining Sequence and Graph Embedding for Source Code Vulnerability Detection publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2023.111623 – ident: ref_114 doi: 10.1145/3465481.3470039 – ident: ref_186 doi: 10.1145/3605098.3636003 – volume: 3 start-page: 213 year: 2023 ident: ref_234 article-title: SCGformer: Smart Contract Vulnerability Detection Based on Control Flow Graph and Transformer publication-title: IET Blockchain doi: 10.1049/blc2.12046 – ident: ref_30 doi: 10.6028/NIST.IR.7695 – volume: 80 start-page: 519 year: 2018 ident: ref_216 article-title: Automatic Security Verification of Mobile App Configurations publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2016.06.014 – volume: 32 start-page: 4 year: 2019 ident: ref_59 article-title: A Comprehensive Survey on Graph Neural Networks publication-title: IEEE Trans. Neural Netw. Learn. Syst. doi: 10.1109/TNNLS.2020.2978386 – ident: ref_76 doi: 10.1007/978-1-4419-0140-8 – volume: 106 start-page: 249 year: 2018 ident: ref_140 article-title: A Systematic Study of the Class Imbalance Problem in Convolutional Neural Networks publication-title: Neural Netw. doi: 10.1016/j.neunet.2018.07.011 – ident: ref_149 doi: 10.3390/electronics9010144 – volume: 12 start-page: 90353 year: 2024 ident: ref_151 article-title: AI-Enabled Healthcare and Enhanced Computational Resource Management With Digital Twins Into Task Offloading Strategies publication-title: IEEE Access doi: 10.1109/ACCESS.2024.3420741 – ident: ref_34 – ident: ref_181 doi: 10.1109/ICCWS48432.2020.9292388 – ident: ref_192 – ident: ref_102 – ident: ref_179 doi: 10.3390/info13070322 – ident: ref_99 doi: 10.3390/app9245364 – ident: ref_125 – volume: 21 start-page: 2286 year: 2024 ident: ref_153 article-title: Machine Learning in Cybersecurity: A Review of Threat Detection and Defense Mechanisms publication-title: World J. Adv. Res. Rev. doi: 10.30574/wjarr.2024.21.1.0315 – ident: ref_137 doi: 10.3390/electronics11020198 – ident: ref_18 – ident: ref_130 – ident: ref_194 doi: 10.1145/3639476.3639762 – volume: 29 start-page: 98 year: 2024 ident: ref_202 article-title: Codesentry: Revolutionizing Real-Time Software Vulnerability Detection With Optimized GPT Framework publication-title: Land Forces Acad. Rev. doi: 10.2478/raft-2024-0010 – ident: ref_93 doi: 10.1109/DSA52907.2021.00013 – volume: 10 start-page: e29917 year: 2024 ident: ref_132 article-title: Combatting Ransomware in ZephyrOS-Activated Industrial IoT Environments publication-title: Heliyon doi: 10.1016/j.heliyon.2024.e29917 – ident: ref_14 doi: 10.6028/NIST.SP.1800-17 – volume: 45 start-page: 56 year: 2012 ident: ref_213 article-title: Using Constraint Programming to Manage Configurations in Self-Adaptive Systems publication-title: Computer doi: 10.1109/MC.2012.286 – ident: ref_252 doi: 10.18653/v1/D19-1410 – ident: ref_124 doi: 10.1109/IJCNN48605.2020.9207304 – volume: 2 start-page: 17 year: 2013 ident: ref_155 article-title: A Survey on Securing the Virtual Cloud publication-title: J. Cloud Comput. Adv. Syst. Appl. doi: 10.1186/2192-113X-2-17 – ident: ref_20 doi: 10.6028/NIST.SP.800-160v2r1 – ident: ref_48 doi: 10.1109/NOMS47738.2020.9110460 – ident: ref_103 doi: 10.1007/978-3-642-36583-6 – ident: ref_31 doi: 10.6028/NIST.IR.7698 – ident: ref_66 doi: 10.1007/978-3-319-93417-4_38 – volume: Volume 12223 start-page: 3 year: 2020 ident: ref_10 article-title: Automated CPE Labeling of CVE Summaries with Machine Learning publication-title: Detection of Intrusions and Malware, and Vulnerability Assessment doi: 10.1007/978-3-030-52683-2_1 – ident: ref_54 doi: 10.14722/ndss.2024.24346 – volume: 27 start-page: 1 year: 2024 ident: ref_80 article-title: Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs publication-title: ACM Trans. Priv. Secur. doi: 10.1145/3641819 – ident: ref_91 doi: 10.18653/v1/2021.emnlp-main.685 – volume: 4 start-page: 53 year: 2018 ident: ref_210 article-title: A Practical Approach to Constructing a Knowledge Graph for Cybersecurity publication-title: Engineering doi: 10.1016/j.eng.2018.01.004 – volume: Volume 3714 start-page: 7 year: 2005 ident: ref_98 article-title: Feature Models, Grammars, and Propositional Formulas publication-title: Software Product Lines doi: 10.1007/11554844_3 – ident: ref_183 doi: 10.21203/rs.3.rs-3238552/v1 – volume: 30 start-page: 1 year: 2021 ident: ref_245 article-title: DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network publication-title: ACM Trans. Softw. Eng. Methodol. doi: 10.1145/3436877 – volume: 49 start-page: 36 year: 2017 ident: ref_211 article-title: Model-Based Analysis of Java EE Web Security Misconfigurations publication-title: Comput. Lang. Syst. Struct. – volume: 13 start-page: 5 year: 2024 ident: ref_150 article-title: A Transformer-Based Network Intrusion Detection Approach for Cloud Security publication-title: J. Cloud Comput. doi: 10.1186/s13677-023-00574-9 – volume: 101 start-page: 387 year: 2019 ident: ref_100 article-title: Automated Analysis of Feature Models: Quo Vadis? publication-title: Computing doi: 10.1007/s00607-018-0646-1 – ident: ref_222 doi: 10.1109/FIT.2017.00037 |
SSID | ssj0002793514 |
Score | 2.3369265 |
SecondaryResourceType | review_article |
Snippet | The number of new vulnerabilities continues to rise significantly each year. Simultaneously, vulnerability databases have challenges in promptly sharing new... |
SourceID | doaj proquest crossref |
SourceType | Open Website Aggregation Database Enrichment Source Index Database |
StartPage | 853 |
SubjectTerms | Academic libraries AI model Automation CPE CVE CWE Cybersecurity Dictionaries Digital libraries graph representation Information systems Literature reviews Metadata Research methodology Software vulnerability detection |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1NTxsxEB2F5NIL0C81fMlSe-Gwwuvd2OsDQiEQRZUSVahUOSCtbK8NQmgTQjjw7xl7vUEVVS978Po0Hs-8scfvAfxQqqIm0zQpMssSxLeDRBsqE608OuZSGuZfI09nfHKd_5wP5h2YtW9hfFtlGxNDoK4Wxp-Rn2QI5XkmZMrOlo-JV43yt6uthIaK0grVaaAY24Ie86rKXeidX85-XW1OXRi6Y0P4zTjLMTzTecNZmmHtf3JvlnlwavpXlgpk_u9idUhA413YjsiRDJul_ggdW3-CnVaVgcRN-hluhsQPruxd05tOmuN_ouqKDDc8nGThyOhFI_iLAnbkz_ODZ6AOzbIv5MKuQ5NWTaZBYzrESPv0Ba7Hl79HkyRqKCQm4-k6UaZCjKCtNpwXTg0UdaLgRWoxCMpK-AKQSpcLbS2msypPnfUXmzjIC22czr5Ct17U9hsQ6rgaMG6d8Vd1VGiJ1SHPMd9j9kut6sNxa7PSRIJxr3PxUGKh4e1bvtm3D983c5cNrcY_Z517029meCrsMLBY3ZZxZ2HtUkjELapAMJNXzkihcsOFEPjB8p714aBduDLuz6fyzZv2_v97Hz4whDGhfU8cQHe9eraHCEPW-ij61itGTttI priority: 102 providerName: ProQuest |
Title | A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies |
URI | https://www.proquest.com/docview/3149637912 https://doaj.org/article/1489215a80824dfc97a4c6777c678882 |
Volume | 4 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVAON databaseName: Directory of Open Access Journals (DOAJ) customDbUrl: eissn: 2624-800X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002793514 issn: 2624-800X databaseCode: DOA dateStart: 20210101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2624-800X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002793514 issn: 2624-800X databaseCode: M~E dateStart: 20180101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2624-800X dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0002793514 issn: 2624-800X databaseCode: BENPR dateStart: 20210101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA4yL178LU7nCOjFQ1n6K2mO29wYwoaIkx2EkqQJMkY3tu6w_96XtJuKghcvPaSBlveS972vef0eQndCZESFknhJqAMP8tvYk4pwTwqbHVPOVWD_Rh6O6GAcPU7iyZdWX7YmrJQHLg3XgnSdAyyJBLAqyoziTESKMsbgAuzNRV-49YVMTd1xGrcl6qUeaQi8vjVVi8gtWPINgZxQ_4847MClf4wOq6wQt8u3OUF7Oj9FR9uOC7jagGforY3t4FK_l3XnuPy0j0We4fZOYxPPDe5uJCR2VXM6_LqeWXVpVwi7wQ-6cAVYOR66_tEu_unVORr3ey_dgVf1R_BUSP3CEyoD_JdaKkoTI2JBDEto4msIcDxjltwRbiImtQaoyiLfaHtoCYM0kcrI8ALV8nmuLxEmhoo4oNooewxHmOTA_GgEWA7I5mtRR_dbm6WqEg-3PSxmKZAIa9_00751dLubuyglM36d1bGm382wMtduAJyfVs5P_3J-HTW2jkurvbdKQyB9NGTcD67-4xnX6CCARMYV8LEGqhXLtb6BRKSQTbTf6Y2enptu7X0A0XTbQA |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NbxMxEB2V9gAXvhGBApaAA4dVvfbGXh8qlH4ppU2EUItyQNraXhuEqk1IUqH8OX4bY683FQJx62UPXmsPs-OZN_b4PYA3WtfUckOzkjuWIb7tZ8ZSlRkd0LFQyrJwG3k0FsPz4sOkP9mAX91dmNBW2cXEGKjrqQ175DscobzgUuXs_exHFlSjwulqJ6Ghk7RCvRspxtLFjhO3-okl3GL3-AD_91vGjg7P9odZUhnILBf5MtO2xixqnLFClF73NfWyFGXuMEyoWoYSiSpfSOMcBvy6yL0LR384KEpjveH43VuwhbCD46ra2jscf_y03uVh6P4twTgTrMB0QCctRyrniu58t7MiLiL6R1aM4gF_5YaY8I7uw92EVMmgda0HsOGah3CvU4EgKSg8gi8DEgbn7lvbC0_a4waim5oM1ryfZOrJ_sog2EyCeeTz1WVgvI7NuSty4JaxKawho6hpHWOyWzyG8xux5hPYbKaNewqEeqH7TDhvw9EglUZhNSoKxBeYbXOne_Cus1llE6F50NW4rLCwCfatru3bg9frubOWxuOfs_aC6dczAvV2HJjOv1ZpJWOtVCrESbpE8FTU3iqpCyuklPgosV7pwXb346oUDxbVtfc--__rV3B7eDY6rU6PxyfP4Q5DCBVbB-U2bC7nV-4FQqCleZn8jMDFTbv2by2vGBA |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LbxMxEB6VVEJcaHmJ0BYsAQcOq3i9G3t9qFDaNGopjSpEUQ5Ii-21qapqE5JUKH-RX8XY602FQNx62YPX2sPseOYbz-MDeKNURU2maVJkliWIb_uJNlQmWnl0zKU0zHcjn4358UX-YdKfbMCvthfGl1W2NjEY6mpq_B15L0MozzMhU9ZzsSzifDh6P_uReAYpn2lt6TRUpFmo9sO4sdjkcWpXPzGcW-yfDPHfv2VsdPT58DiJjAOJyXi6TJSp0KNqqw3nhVN9RZ0oeJFaNBmyEj5cotLlQluLxr_KU2d9GhAXeaGN0xl-9x5sCt8v2oHNg6Px-af1jQ_Do9AMG2ec5ega6KSZl5plkvauzCwPB4r-4SEDkcBffiI4v9E2PIyolQwaNXsEG7Z-DFstIwSJBuIJfB0Qvzi3l01dPGlSD0TVFRmsZ4CSqSOHK43AM5LnkS831376dSjUXZGhXYYCsZqcBX7rYJ_t4ilc3Ik0n0Gnntb2ORDquOozbp3xaUIqtMTIlOeINdDzplZ14V0rs9LE4eaeY-O6xCDHy7e8lW8XXq_3zpqRHv_cdeBFv97hx3CHhen8exlPNcZNhUTMpAoEUnnljBQqN1wIgY8CY5cu7LY_roy2YVHeavKL_79-BfdRxcuPJ-PTHXjAEE2FKkKxC53l_MbuIRpa6pdRzQh8u2vN_g0mchxK |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Comprehensive+Review+and+Assessment+of+Cybersecurity+Vulnerability+Detection+Methodologies&rft.jtitle=Journal+of+cybersecurity+and+privacy&rft.au=Bennouk%2C+Khalid&rft.au=Ait+Aali%2C+Nawal&rft.au=El+Bouzekri+El+Idrissi%2C+Youn%C3%A8s&rft.au=Sebai%2C+Bechir&rft.date=2024-10-07&rft.issn=2624-800X&rft.eissn=2624-800X&rft.volume=4&rft.issue=4&rft.spage=853&rft.epage=908&rft_id=info:doi/10.3390%2Fjcp4040040&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_jcp4040040 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2624-800X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2624-800X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2624-800X&client=summon |