Search Results for author: Waseem Shadid

Found 4 papers, 1 papers with code

Automated CVE Analysis for Threat Prioritization and Impact Prediction

no code implementations6 Sep 2023 Ehsan Aghaei, Ehab Al-Shaer, Waseem Shadid, Xi Niu

Unfortunately, this manual analysis presents a major bottleneck in the vulnerability analysis process, leading to slowdowns in proactive cybersecurity efforts and the potential for inaccuracies due to human errors.

SecureBERT: A Domain-Specific Language Model for Cybersecurity

1 code implementation6 Apr 2022 Ehsan Aghaei, Xi Niu, Waseem Shadid, Ehab Al-Shaer

Natural Language Processing (NLP) has recently gained wide attention in cybersecurity, particularly in Cyber Threat Intelligence (CTI) and cyber automation.

Language Modelling Masked Language Modeling +1

A System for 3D Reconstruction Of Comminuted Tibial Plafond Bone Fractures

no code implementations23 Feb 2021 Pengcheng Liu, Nathan Hewitt, Waseem Shadid, Andrew Willis

We propose a system to semi-automatically extract quantitative metrics that are major indicators of fracture severity.

3D Reconstruction Anatomy

ThreatZoom: CVE2CWE using Hierarchical Neural Network

no code implementations24 Sep 2020 Ehsan Aghaei, Waseem Shadid, Ehab Al-Shaer

The Common Vulnerabilities and Exposures (CVE) represent standard means for sharing publicly known information security vulnerabilities.

Cannot find the paper you are looking for? You can Submit a new open access paper.