no code implementations • 6 Sep 2023 • Ehsan Aghaei, Ehab Al-Shaer, Waseem Shadid, Xi Niu
Unfortunately, this manual analysis presents a major bottleneck in the vulnerability analysis process, leading to slowdowns in proactive cybersecurity efforts and the potential for inaccuracies due to human errors.
1 code implementation • 6 Apr 2022 • Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-Shaer
Natural Language Processing (NLP) has recently gained wide attention in cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation.
no code implementations • 23 Feb 2021 • Pengcheng Liu, Nathan Hewitt, Waseem Shadid, Andrew Willis
We propose a system to semi-automatically extract quantitative metrics that are major indicators of fracture severity.
no code implementations • 24 Sep 2020 • Ehsan Aghaei, Waseem Shadid, Ehab Al-Shaer
The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing publicly known information security vulnerabilities.