Search Results - "de Aguiar, Leandro Pfleger"
-
1
A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits
Published in IEEE eTransactions on network and service management (01-09-2023)“…Data on software vulnerabilities, products, and exploits are typically collected from multiple non-structured sources. Valuable information, e.g., on which…”
Get full text
Journal Article -
2
Beyond Herd Immunity Against Strategic Attackers
Published in IEEE access (2020)“…Herd immunity, one of the most fundamental concepts in network epidemics, occurs when a large fraction of the population of devices is immune against a virus…”
Get full text
Journal Article -
3
On the Flow of Software Security Advisories
Published in IEEE eTransactions on network and service management (01-06-2021)“…In this paper, we report results on a large scale measurement campaign to collect temporal information about events associated with software vulnerabilities…”
Get full text
Journal Article -
4
Rejuvenation and the Spread of Epidemics in General Topologies
Published in 2014 IEEE International Symposium on Software Reliability Engineering Workshops (01-11-2014)“…Epidemic models have received significant attention in the past few decades to study the propagation of viruses, worms and ideas in computer and social…”
Get full text
Conference Proceeding -
5
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums
Published in 2023 IEEE International Conference on Cyber Security and Resilience (CSR) (31-07-2023)“…This paper proposes a machine learning-based approach for detecting the exploitation of vulnerabilities in the wild by monitoring underground hacking forums…”
Get full text
Conference Proceeding -
6
Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach
Published in 2021 IEEE International Conference on Cyber Security and Resilience (CSR) (26-07-2021)“…Data on software vulnerabilities, products and exploits is typically collected from multiple non-structured sources. Valuable information, e.g., on which…”
Get full text
Conference Proceeding -
7
Is Vulnerability Report Confidence Redundant? Pitfalls Using Temporal Risk Scores
Published in IEEE security & privacy (01-07-2021)“…The Common Vulnerability Scoring System score is the de facto standard to assess risk of software vulnerabilities, with three temporal components:…”
Get full text
Magazine Article -
8
Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums
Published 03-08-2023“…This paper proposes a machine learning-based approach for detecting the exploitation of vulnerabilities in the wild by monitoring underground hacking forums…”
Get full text
Journal Article -
9
Detecting PLC control corruption via on-device runtime verification
Published in 2016 Resilience Week (RWS) (01-08-2016)“…With an increased emphasis on the cyber-physical security of safety-critical industrial control systems, programmable logic controllers have been targeted by…”
Get full text
Conference Proceeding -
10
Improving control system resilience by highly coupling security functions with control
Published in 2015 Resilience Week (RWS) (01-08-2015)“…This paper presents an on-going research work to improve control system resilience by running control and cybersecurity side-by-side in a highly-coupled…”
Get full text
Conference Proceeding