Search Results for author: Ehab Al-Shaer

Found 8 papers, 2 papers with code

Automated CVE Analysis for Threat Prioritization and Impact Prediction

no code implementations6 Sep 2023 Ehsan Aghaei, Ehab Al-Shaer, Waseem Shadid, Xi Niu

Unfortunately, this manual analysis presents a major bottleneck in the vulnerability analysis process, leading to slowdowns in proactive cybersecurity efforts and the potential for inaccuracies due to human errors.

CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model

no code implementations6 Sep 2023 Ehsan Aghaei, Ehab Al-Shaer

This automated correlation facilitates the creation of labeled data, essential for categorizing novel threat actions into threat functionality classes and TTPs.

Language Modelling Semantic Role Labeling

SecureBERT: A Domain-Specific Language Model for Cybersecurity

1 code implementation6 Apr 2022 Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-Shaer

Natural Language Processing (NLP) has recently gained wide attention in cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation.

Language Modelling Masked Language Modeling +1

Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense

no code implementations19 Apr 2021 Ashutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee

With the increasing system complexity and attack sophistication, the necessity of autonomous cyber defense becomes vivid for cyber and cyber-physical systems (CPSs).

Decision Making reinforcement-learning +1

V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities

1 code implementation23 Feb 2021 Siddhartha Shankar Das, Edoardo Serra, Mahantesh Halappanavar, Alex Pothen, Ehab Al-Shaer

Weaknesses in computer systems such as faults, bugs and errors in the architecture, design or implementation of software provide vulnerabilities that can be exploited by attackers to compromise the security of a system.

General Classification Link Prediction +1

ThreatZoom: CVE2CWE using Hierarchical Neural Network

no code implementations24 Sep 2020 Ehsan Aghaei, Waseem Shadid, Ehab Al-Shaer

The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing publicly known information security vulnerabilities.

Cannot find the paper you are looking for? You can Submit a new open access paper.