Articles with "att techniques" as a keyword



Photo by heftiba from unsplash

CVE2ATT&CK: BERT-Based Mapping of CVEs to MITRE ATT&CK Techniques

Sign Up to like & get
recommendations!
Published in 2022 at "Algorithms"

DOI: 10.3390/a15090314

Abstract: Since cyber-attacks are ever-increasing in number, intensity, and variety, a strong need for a global, standardized cyber-security knowledge database has emerged as a means to prevent and fight cybercrime. Attempts already exist in this regard.… read more here.

Keywords: based mapping; bert based; cve2att bert; mitre att ... See more keywords