AI in Cybersecurity by Leslie F. Sikos

AI in Cybersecurity by Leslie F. Sikos

Author:Leslie F. Sikos
Language: eng
Format: epub
ISBN: 9783319988429
Publisher: Springer International Publishing


4.4.2.4 Presence of Proof-of-Concept

The presence of PoC exploits in EDB increases the likelihood of vulnerability exploitation. It can be treated as a binary feature that indicates whether a PoC is present for a vulnerability or not.

4.4.2.5 Vulnerability Mention on ZDI

ZDI acts similar to the NVD, i.e., both disclose software vulnerabilities. Given that a vulnerability is disclosed on ZDI, its exploitation likelihood raises. Similar to the presence of PoCs, a binary feature can be used to denote whether a vulnerability was disclosed in ZDI before it is exploited.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.