Making security measurable and manageable, MILCOM 2008, 2008 IEEE Military Communications Conference, pp.1-9, 2008. ,
DOI : 10.1109/MILCOM.2008.4753203
URL : http://www.stsc.hill.af.mil/crosstalk/2009/09/0909Martin.pdf
OVM, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, 2009. ,
DOI : 10.1145/1558607.1558646
HuMa: A Multi-layer Framework for Threat Analysis in a Heterogeneous Log Environment, FPS, ser, pp.144-159, 2017. ,
DOI : 10.1007/978-3-642-23088-2_15
The CAPEC based generator of attack scenarios for network security evaluation, 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp.436-441, 2015. ,
DOI : 10.1109/IDAACS.2015.7340774
Offline Risk Assessment of Cloud Service Providers, IEEE Cloud Computing, vol.2, issue.3, pp.50-57, 2015. ,
DOI : 10.1109/MCC.2015.63
Interactive visualization and text mining for the capec cyber attack catalog, Proceedings of the ACM Intelligent User Interfaces Workshop on Visual Text Analytics, 2015. ,
A Categorization Framework for Common Computer Vulnerabilities and Exposures, The Computer Journal, vol.53, issue.5, pp.551-580, 2010. ,
DOI : 10.1093/comjnl/bxp040
Associating the Severity of Vulnerabilities with their Description, CAiSE Workshops, ser. Lecture Notes in Business Information Processing, pp.231-242, 2016. ,
DOI : 10.1016/j.dss.2010.08.020
Security trend analysis with CVE topic models, " in ISSRE, pp.111-120, 2010. ,
Ranking Attacks Based on Vulnerability Analysis, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010. ,
DOI : 10.1109/HICSS.2010.313
Figure 8: Computational Time calculated by varying the number of Snort Alerts Messages to be mapped to the whole set of Capec Fields., PeerJ Computer Science, vol.12, issue.2, p.25, 2015. ,
DOI : 10.7717/peerj-cs.25/fig-8
Efficient estimation of word representations in vector space, 1301. ,
A recommender system in the cyber defense domain, 2014. ,
A Survey of Link Prediction in Complex Networks, ACM Computing Surveys, vol.49, issue.4, pp.1-6933, 2017. ,
DOI : 10.1140/epjb/e2009-00335-8
Friends and neighbors on the Web, Social Networks, vol.25, issue.3, pp.211-230, 2003. ,
DOI : 10.1016/S0378-8733(03)00009-1
Predicting missing links via local information, The European Physical Journal B, vol.30, issue.4, pp.623-630, 2009. ,
DOI : 10.1126/science.1073374
URL : http://arxiv.org/pdf/0901.0553
Emergence of scaling in random networks, Science, vol.286, issue.5439, pp.509-512, 1999. ,
A STATISTICAL INTERPRETATION OF TERM SPECIFICITY AND ITS APPLICATION IN RETRIEVAL, Journal of Documentation, vol.28, issue.1, pp.11-21, 1972. ,
DOI : 10.1002/asi.5090180209
Link prediction via matrix completion, EPL (Europhysics Letters), vol.117, issue.3, p.38002, 2017. ,
DOI : 10.1209/0295-5075/117/38002
URL : http://arxiv.org/pdf/1606.06812
Algorithms for non-negative matrix factorization, NIPS, pp.556-562, 2000. ,
Evaluating learning algorithms: a classification perspective, 2011. ,
DOI : 10.1017/CBO9780511921803
Using AUC and accuracy in evaluating learning algorithms, IEEE Transactions on Knowledge and Data Engineering, vol.17, issue.3, pp.299-310, 2005. ,
DOI : 10.1109/TKDE.2005.50
Predicting positive and negative links in online social networks, Proceedings of the 19th international conference on World wide web, WWW '10, 2010. ,
DOI : 10.1145/1772690.1772756
A Survey of Predictive Modeling on Imbalanced Domains, ACM Computing Surveys, vol.49, issue.2, pp.311-3150, 2016. ,
DOI : 10.1007/11766247_46
Social recommendation: a review, Social Network Analysis and Mining, vol.26, issue.3, 2013. ,
DOI : 10.1145/1772690.1772790