Automated CVE Analysis for Threat Prioritization and Impact Prediction Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2309.03040
The Common Vulnerabilities and Exposures (CVE) are pivotal information for proactive cybersecurity measures, including service patching, security hardening, and more. However, CVEs typically offer low-level, product-oriented descriptions of publicly disclosed cybersecurity vulnerabilities, often lacking the essential attack semantic information required for comprehensive weakness characterization and threat impact estimation. This critical insight is essential for CVE prioritization and the identification of potential countermeasures, particularly when dealing with a large number of CVEs. Current industry practices involve manual evaluation of CVEs to assess their attack severities using the Common Vulnerability Scoring System (CVSS) and mapping them to Common Weakness Enumeration (CWE) for potential mitigation identification. Unfortunately, this manual analysis presents a major bottleneck in the vulnerability analysis process, leading to slowdowns in proactive cybersecurity efforts and the potential for inaccuracies due to human errors. In this research, we introduce our novel predictive model and tool (called CVEDrill) which revolutionizes CVE analysis and threat prioritization. CVEDrill accurately estimates the CVSS vector for precise threat mitigation and priority ranking and seamlessly automates the classification of CVEs into the appropriate CWE hierarchy classes. By harnessing CVEDrill, organizations can now implement cybersecurity countermeasure mitigation with unparalleled accuracy and timeliness, surpassing in this domain the capabilities of state-of-the-art tools like ChaptGPT.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2309.03040
- https://arxiv.org/pdf/2309.03040
- OA Status
- green
- Cited By
- 3
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4386556345
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4386556345Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2309.03040Digital Object Identifier
- Title
-
Automated CVE Analysis for Threat Prioritization and Impact PredictionWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-09-06Full publication date if available
- Authors
-
Ehsan Aghaei, Ehab Al‐Shaer, Waseem Shadid, Xi NiuList of authors in order
- Landing page
-
https://arxiv.org/abs/2309.03040Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2309.03040Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2309.03040Direct OA link when available
- Concepts
-
Computer science, Computer security, Prioritization, Vulnerability assessment, Vulnerability (computing), Identification (biology), Risk analysis (engineering), Process (computing), Countermeasure, Exploit, Process management, Engineering, Business, Biology, Operating system, Psychological resilience, Aerospace engineering, Psychotherapist, Botany, PsychologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1, 2024: 2Per-year citation counts (last 5 years)
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4386556345 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2309.03040 |
| ids.doi | https://doi.org/10.48550/arxiv.2309.03040 |
| ids.openalex | https://openalex.org/W4386556345 |
| fwci | |
| type | preprint |
| title | Automated CVE Analysis for Threat Prioritization and Impact Prediction |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10734 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9986000061035156 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Information and Cyber Security |
| topics[1].id | https://openalex.org/T10260 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9865000247955322 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Software Engineering Research |
| topics[2].id | https://openalex.org/T10400 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9842000007629395 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7456060647964478 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.5962706208229065 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C2777615720 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5543906092643738 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q11888847 |
| concepts[2].display_name | Prioritization |
| concepts[3].id | https://openalex.org/C167063184 |
| concepts[3].level | 3 |
| concepts[3].score | 0.5446138381958008 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1400839 |
| concepts[3].display_name | Vulnerability assessment |
| concepts[4].id | https://openalex.org/C95713431 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5337162017822266 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[4].display_name | Vulnerability (computing) |
| concepts[5].id | https://openalex.org/C116834253 |
| concepts[5].level | 2 |
| concepts[5].score | 0.5266867876052856 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2039217 |
| concepts[5].display_name | Identification (biology) |
| concepts[6].id | https://openalex.org/C112930515 |
| concepts[6].level | 1 |
| concepts[6].score | 0.4959636628627777 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q4389547 |
| concepts[6].display_name | Risk analysis (engineering) |
| concepts[7].id | https://openalex.org/C98045186 |
| concepts[7].level | 2 |
| concepts[7].score | 0.4691031873226166 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q205663 |
| concepts[7].display_name | Process (computing) |
| concepts[8].id | https://openalex.org/C21593369 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4609191417694092 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q1032176 |
| concepts[8].display_name | Countermeasure |
| concepts[9].id | https://openalex.org/C165696696 |
| concepts[9].level | 2 |
| concepts[9].score | 0.415877103805542 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q11287 |
| concepts[9].display_name | Exploit |
| concepts[10].id | https://openalex.org/C195094911 |
| concepts[10].level | 1 |
| concepts[10].score | 0.2865828275680542 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q14167904 |
| concepts[10].display_name | Process management |
| concepts[11].id | https://openalex.org/C127413603 |
| concepts[11].level | 0 |
| concepts[11].score | 0.15924420952796936 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[11].display_name | Engineering |
| concepts[12].id | https://openalex.org/C144133560 |
| concepts[12].level | 0 |
| concepts[12].score | 0.11979705095291138 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q4830453 |
| concepts[12].display_name | Business |
| concepts[13].id | https://openalex.org/C86803240 |
| concepts[13].level | 0 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[13].display_name | Biology |
| concepts[14].id | https://openalex.org/C111919701 |
| concepts[14].level | 1 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[14].display_name | Operating system |
| concepts[15].id | https://openalex.org/C137176749 |
| concepts[15].level | 2 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q4105337 |
| concepts[15].display_name | Psychological resilience |
| concepts[16].id | https://openalex.org/C146978453 |
| concepts[16].level | 1 |
| concepts[16].score | 0.0 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q3798668 |
| concepts[16].display_name | Aerospace engineering |
| concepts[17].id | https://openalex.org/C542102704 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q183257 |
| concepts[17].display_name | Psychotherapist |
| concepts[18].id | https://openalex.org/C59822182 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q441 |
| concepts[18].display_name | Botany |
| concepts[19].id | https://openalex.org/C15744967 |
| concepts[19].level | 0 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[19].display_name | Psychology |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7456060647964478 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.5962706208229065 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/prioritization |
| keywords[2].score | 0.5543906092643738 |
| keywords[2].display_name | Prioritization |
| keywords[3].id | https://openalex.org/keywords/vulnerability-assessment |
| keywords[3].score | 0.5446138381958008 |
| keywords[3].display_name | Vulnerability assessment |
| keywords[4].id | https://openalex.org/keywords/vulnerability |
| keywords[4].score | 0.5337162017822266 |
| keywords[4].display_name | Vulnerability (computing) |
| keywords[5].id | https://openalex.org/keywords/identification |
| keywords[5].score | 0.5266867876052856 |
| keywords[5].display_name | Identification (biology) |
| keywords[6].id | https://openalex.org/keywords/risk-analysis |
| keywords[6].score | 0.4959636628627777 |
| keywords[6].display_name | Risk analysis (engineering) |
| keywords[7].id | https://openalex.org/keywords/process |
| keywords[7].score | 0.4691031873226166 |
| keywords[7].display_name | Process (computing) |
| keywords[8].id | https://openalex.org/keywords/countermeasure |
| keywords[8].score | 0.4609191417694092 |
| keywords[8].display_name | Countermeasure |
| keywords[9].id | https://openalex.org/keywords/exploit |
| keywords[9].score | 0.415877103805542 |
| keywords[9].display_name | Exploit |
| keywords[10].id | https://openalex.org/keywords/process-management |
| keywords[10].score | 0.2865828275680542 |
| keywords[10].display_name | Process management |
| keywords[11].id | https://openalex.org/keywords/engineering |
| keywords[11].score | 0.15924420952796936 |
| keywords[11].display_name | Engineering |
| keywords[12].id | https://openalex.org/keywords/business |
| keywords[12].score | 0.11979705095291138 |
| keywords[12].display_name | Business |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2309.03040 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2309.03040 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2309.03040 |
| locations[1].id | doi:10.48550/arxiv.2309.03040 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2309.03040 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5018155820 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Ehsan Aghaei |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Aghaei, Ehsan |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5043893479 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-7665-8293 |
| authorships[1].author.display_name | Ehab Al‐Shaer |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Al-Shaer, Ehab |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5034160563 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-0025-920X |
| authorships[2].author.display_name | Waseem Shadid |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Shadid, Waseem |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5069430572 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-5418-6969 |
| authorships[3].author.display_name | Xi Niu |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Niu, Xi |
| authorships[3].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2309.03040 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Automated CVE Analysis for Threat Prioritization and Impact Prediction |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10734 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9986000061035156 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Information and Cyber Security |
| related_works | https://openalex.org/W2906845177, https://openalex.org/W4200107511, https://openalex.org/W1883246888, https://openalex.org/W2891427086, https://openalex.org/W1968625315, https://openalex.org/W2370114625, https://openalex.org/W1756374135, https://openalex.org/W2947584067, https://openalex.org/W3118510577, https://openalex.org/W2280562859 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 2 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2309.03040 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2309.03040 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2309.03040 |
| primary_location.id | pmh:oai:arXiv.org:2309.03040 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2309.03040 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2309.03040 |
| publication_date | 2023-09-06 |
| publication_year | 2023 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 66, 108 |
| abstract_inverted_index.By | 178 |
| abstract_inverted_index.In | 132 |
| abstract_inverted_index.in | 111, 119, 194 |
| abstract_inverted_index.is | 51 |
| abstract_inverted_index.of | 27, 59, 69, 77, 170, 199 |
| abstract_inverted_index.to | 79, 94, 117, 129 |
| abstract_inverted_index.we | 135 |
| abstract_inverted_index.CVE | 54, 147 |
| abstract_inverted_index.CWE | 175 |
| abstract_inverted_index.The | 0 |
| abstract_inverted_index.and | 3, 18, 44, 56, 91, 123, 141, 149, 162, 165, 191 |
| abstract_inverted_index.are | 6 |
| abstract_inverted_index.can | 182 |
| abstract_inverted_index.due | 128 |
| abstract_inverted_index.for | 9, 40, 53, 99, 126, 158 |
| abstract_inverted_index.now | 183 |
| abstract_inverted_index.our | 137 |
| abstract_inverted_index.the | 34, 57, 85, 112, 124, 155, 168, 173, 197 |
| abstract_inverted_index.CVEs | 21, 78, 171 |
| abstract_inverted_index.CVSS | 156 |
| abstract_inverted_index.This | 48 |
| abstract_inverted_index.into | 172 |
| abstract_inverted_index.like | 202 |
| abstract_inverted_index.them | 93 |
| abstract_inverted_index.this | 104, 133, 195 |
| abstract_inverted_index.tool | 142 |
| abstract_inverted_index.when | 63 |
| abstract_inverted_index.with | 65, 188 |
| abstract_inverted_index.(CVE) | 5 |
| abstract_inverted_index.(CWE) | 98 |
| abstract_inverted_index.CVEs. | 70 |
| abstract_inverted_index.human | 130 |
| abstract_inverted_index.large | 67 |
| abstract_inverted_index.major | 109 |
| abstract_inverted_index.model | 140 |
| abstract_inverted_index.more. | 19 |
| abstract_inverted_index.novel | 138 |
| abstract_inverted_index.offer | 23 |
| abstract_inverted_index.often | 32 |
| abstract_inverted_index.their | 81 |
| abstract_inverted_index.tools | 201 |
| abstract_inverted_index.using | 84 |
| abstract_inverted_index.which | 145 |
| abstract_inverted_index.(CVSS) | 90 |
| abstract_inverted_index.Common | 1, 86, 95 |
| abstract_inverted_index.System | 89 |
| abstract_inverted_index.assess | 80 |
| abstract_inverted_index.attack | 36, 82 |
| abstract_inverted_index.domain | 196 |
| abstract_inverted_index.impact | 46 |
| abstract_inverted_index.manual | 75, 105 |
| abstract_inverted_index.number | 68 |
| abstract_inverted_index.threat | 45, 150, 160 |
| abstract_inverted_index.vector | 157 |
| abstract_inverted_index.(called | 143 |
| abstract_inverted_index.Current | 71 |
| abstract_inverted_index.Scoring | 88 |
| abstract_inverted_index.dealing | 64 |
| abstract_inverted_index.efforts | 122 |
| abstract_inverted_index.errors. | 131 |
| abstract_inverted_index.insight | 50 |
| abstract_inverted_index.involve | 74 |
| abstract_inverted_index.lacking | 33 |
| abstract_inverted_index.leading | 116 |
| abstract_inverted_index.mapping | 92 |
| abstract_inverted_index.pivotal | 7 |
| abstract_inverted_index.precise | 159 |
| abstract_inverted_index.ranking | 164 |
| abstract_inverted_index.service | 14 |
| abstract_inverted_index.CVEDrill | 152 |
| abstract_inverted_index.However, | 20 |
| abstract_inverted_index.Weakness | 96 |
| abstract_inverted_index.accuracy | 190 |
| abstract_inverted_index.analysis | 106, 114, 148 |
| abstract_inverted_index.classes. | 177 |
| abstract_inverted_index.critical | 49 |
| abstract_inverted_index.industry | 72 |
| abstract_inverted_index.presents | 107 |
| abstract_inverted_index.priority | 163 |
| abstract_inverted_index.process, | 115 |
| abstract_inverted_index.publicly | 28 |
| abstract_inverted_index.required | 39 |
| abstract_inverted_index.security | 16 |
| abstract_inverted_index.semantic | 37 |
| abstract_inverted_index.weakness | 42 |
| abstract_inverted_index.CVEDrill) | 144 |
| abstract_inverted_index.CVEDrill, | 180 |
| abstract_inverted_index.ChaptGPT. | 203 |
| abstract_inverted_index.Exposures | 4 |
| abstract_inverted_index.automates | 167 |
| abstract_inverted_index.disclosed | 29 |
| abstract_inverted_index.essential | 35, 52 |
| abstract_inverted_index.estimates | 154 |
| abstract_inverted_index.hierarchy | 176 |
| abstract_inverted_index.implement | 184 |
| abstract_inverted_index.including | 13 |
| abstract_inverted_index.introduce | 136 |
| abstract_inverted_index.measures, | 12 |
| abstract_inverted_index.patching, | 15 |
| abstract_inverted_index.potential | 60, 100, 125 |
| abstract_inverted_index.practices | 73 |
| abstract_inverted_index.proactive | 10, 120 |
| abstract_inverted_index.research, | 134 |
| abstract_inverted_index.slowdowns | 118 |
| abstract_inverted_index.typically | 22 |
| abstract_inverted_index.accurately | 153 |
| abstract_inverted_index.bottleneck | 110 |
| abstract_inverted_index.evaluation | 76 |
| abstract_inverted_index.hardening, | 17 |
| abstract_inverted_index.harnessing | 179 |
| abstract_inverted_index.low-level, | 24 |
| abstract_inverted_index.mitigation | 101, 161, 187 |
| abstract_inverted_index.predictive | 139 |
| abstract_inverted_index.seamlessly | 166 |
| abstract_inverted_index.severities | 83 |
| abstract_inverted_index.surpassing | 193 |
| abstract_inverted_index.Enumeration | 97 |
| abstract_inverted_index.appropriate | 174 |
| abstract_inverted_index.estimation. | 47 |
| abstract_inverted_index.information | 8, 38 |
| abstract_inverted_index.timeliness, | 192 |
| abstract_inverted_index.capabilities | 198 |
| abstract_inverted_index.descriptions | 26 |
| abstract_inverted_index.inaccuracies | 127 |
| abstract_inverted_index.particularly | 62 |
| abstract_inverted_index.unparalleled | 189 |
| abstract_inverted_index.Vulnerability | 87 |
| abstract_inverted_index.comprehensive | 41 |
| abstract_inverted_index.cybersecurity | 11, 30, 121, 185 |
| abstract_inverted_index.organizations | 181 |
| abstract_inverted_index.vulnerability | 113 |
| abstract_inverted_index.Unfortunately, | 103 |
| abstract_inverted_index.classification | 169 |
| abstract_inverted_index.countermeasure | 186 |
| abstract_inverted_index.identification | 58 |
| abstract_inverted_index.prioritization | 55 |
| abstract_inverted_index.revolutionizes | 146 |
| abstract_inverted_index.Vulnerabilities | 2 |
| abstract_inverted_index.identification. | 102 |
| abstract_inverted_index.prioritization. | 151 |
| abstract_inverted_index.characterization | 43 |
| abstract_inverted_index.countermeasures, | 61 |
| abstract_inverted_index.product-oriented | 25 |
| abstract_inverted_index.state-of-the-art | 200 |
| abstract_inverted_index.vulnerabilities, | 31 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile |