May 2, 2023, 1:10 a.m. | Zhenpeng Shi, Nikolay Matyunin, Kalman Graffi, David Starobinski

cs.CR updates on arXiv.org arxiv.org

Security assessment relies on public information about products,
vulnerabilities, and weaknesses. So far, databases in these categories have
rarely been analyzed in combination. Yet, doing so could help predict
unreported vulnerabilities and identify common threat patterns. In this paper,
we propose a methodology for producing and optimizing a knowledge graph that
aggregates knowledge from common threat databases (CVE, CWE, and CPE). We apply
the threat knowledge graph to predict associations between threat databases,
specifically between products, vulnerabilities, and weaknesses. We …

assessment cpe cve cwe databases doing graphs identify information knowledge knowledge graph patterns predict producing products public security security assessment threat vulnerabilities

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Data Privacy Manager m/f/d)

@ Coloplast | Hamburg, HH, DE

Cybersecurity Sr. Manager

@ Eastman | Kingsport, TN, US, 37660

KDN IAM Associate Consultant

@ KPMG India | Hyderabad, Telangana, India

Learning Experience Designer in Cybersecurity (f/m/div.) (Salary: ~113.000 EUR p.a.*)

@ Bosch Group | Stuttgart, Germany

Senior Security Engineer - SIEM

@ Samsara | Remote - US