Skip to main content
Top
Published in:
Cover of the book

2018 | OriginalPaper | Chapter

Review into State of the Art of Vulnerability Assessment using Artificial Intelligence

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Vulnerability assessment is the essential and well-established process of probing security flaws, weaknesses and inadequacies in a computing infrastructure. The process helps organisations to eliminate security issues before attackers can exploit them for monetary gains or other malicious purposes. The significant advancements in desktop, Web and mobile computing technologies have widened the range of security-related complications. It has become an increasingly crucial challenge for security analysts to devise comprehensive security evaluation and mitigation tools that can protect the business-critical operations. Researchers have proposed a variety of methods for vulnerability assessment, which can be broadly categorised into manual, assistive and fully automated. Manual vulnerability assessment is performed by a human expert, based on a specific set of instructions that are aimed at finding the security vulnerability. This method requires a large amount of time, effort and resources, and it is heavily reliant on expert knowledge, something that is widely attributed to being in short supply. The assistive vulnerability assessment is conducted with the help of scanning tools or frameworks that are usually up-to-date and look for the most relevant security weakness. However, the lack of flexibility, compatibility and regular maintenance of tools, as they contain static knowledge, renders them outdated and does not provide the beneficial information (in terms of depth and scope of tests) about the state of security. Fully automated vulnerability assessment leverages artificial intelligence techniques to produce expert-like decisions without human assistance and is by far considered as the most desirable (due to time and financial reduction for the end-user) method of evaluating a systems’ security. Although being highly desirable, such techniques require additional research in improving automated knowledge acquisition, representation and learning mechanisms. Further research is also needed to develop automated vulnerability mitigation techniques that are capable of actually securing the computing platform. The volume of research being performed into the use of artificial intelligence techniques in vulnerability assessment is increasing, and there is a need to provide a survey into the state of the art.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sadeghi A, Bagheri H, Garcia J Malek S (2017) A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software. IEEE Trans Softw Eng 43(6):492–530 Sadeghi A, Bagheri H, Garcia J Malek S (2017) A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software. IEEE Trans Softw Eng 43(6):492–530
2.
go back to reference Cherdantseva Y, Hilton J (2013) A reference model of information assurance and security. In: 2013 eighth international conference on availability, reliability and security (ARES), IEEE, pp 546–555 Cherdantseva Y, Hilton J (2013) A reference model of information assurance and security. In: 2013 eighth international conference on availability, reliability and security (ARES), IEEE, pp 546–555
3.
go back to reference Smith GS (2004) Recognizing and preparing loss estimates from cyber-attacks. Inf Syst Sec 12(6):46–57 Smith GS (2004) Recognizing and preparing loss estimates from cyber-attacks. Inf Syst Sec 12(6):46–57
4.
go back to reference Jerman-Blažič B et al (2008) An economic modelling approach to information security risk management. Int J Inf Manag 28(5):413–422CrossRef Jerman-Blažič B et al (2008) An economic modelling approach to information security risk management. Int J Inf Manag 28(5):413–422CrossRef
5.
go back to reference Butler, S.A (2002) Security attribute evaluation method: a cost-benefit approach. In: Proceedings of the 24th international conference on software engineering, ACM, pp 232–240 Butler, S.A (2002) Security attribute evaluation method: a cost-benefit approach. In: Proceedings of the 24th international conference on software engineering, ACM, pp 232–240
6.
go back to reference Romanosky S, Telang R, Acquisti A (2011) Do data breach disclosure laws reduce identity theft? J Policy Anal Manag 30(2):256–286CrossRef Romanosky S, Telang R, Acquisti A (2011) Do data breach disclosure laws reduce identity theft? J Policy Anal Manag 30(2):256–286CrossRef
7.
go back to reference O’dowd A (2017) Major global cyber-attack hits NHS and delays treatment. BMJ: British Med J (Online) 357 O’dowd A (2017) Major global cyber-attack hits NHS and delays treatment. BMJ: British Med J (Online) 357
8.
go back to reference Shahzad M, Shafiq MZ, Liu AX (2012) A large scale exploratory analysis of software vulnerability life cycles. In: Proceedings of the 34th international conference on software engineering, IEEE Press, pp 771–781 Shahzad M, Shafiq MZ, Liu AX (2012) A large scale exploratory analysis of software vulnerability life cycles. In: Proceedings of the 34th international conference on software engineering, IEEE Press, pp 771–781
10.
go back to reference Ablon L, Heaton P, Lavery DC, Romanosky S (2016) Consumer attitudes toward data breach notifications and loss of personal information. Rand Corporation, CaliforniaCrossRef Ablon L, Heaton P, Lavery DC, Romanosky S (2016) Consumer attitudes toward data breach notifications and loss of personal information. Rand Corporation, CaliforniaCrossRef
11.
go back to reference Keller S, Powell A, Horstmann B, Predmore C, Crawford M (2005) Information security threats and practices in small businesses. Inf Syst Manag 22(2):7CrossRef Keller S, Powell A, Horstmann B, Predmore C, Crawford M (2005) Information security threats and practices in small businesses. Inf Syst Manag 22(2):7CrossRef
12.
go back to reference Parkinson S (2017) Use of access control to minimise ransomware impact. Netw Sec 7:5–8CrossRef Parkinson S (2017) Use of access control to minimise ransomware impact. Netw Sec 7:5–8CrossRef
13.
go back to reference Kharraz A, Robertson W, Balzarotti D, Bilge L, Kirda E (2015) Cutting the gordian knot: a look under the hood of ransomware attacks. In: International conference on detection of intrusions and malware, and vulnerability assessment, Springer, pp 3–24 Kharraz A, Robertson W, Balzarotti D, Bilge L, Kirda E (2015) Cutting the gordian knot: a look under the hood of ransomware attacks. In: International conference on detection of intrusions and malware, and vulnerability assessment, Springer, pp 3–24
14.
go back to reference Kamongi P, Kotikela S, Kavi K, Gomathisankaran M, Singhal A (2013) Vulcan: Vulnerability assessment framework for cloud computing. In: 2013 IEEE 7th international conference on software security and reliability (SERE), IEEE, pp 218–226 Kamongi P, Kotikela S, Kavi K, Gomathisankaran M, Singhal A (2013) Vulcan: Vulnerability assessment framework for cloud computing. In: 2013 IEEE 7th international conference on software security and reliability (SERE), IEEE, pp 218–226
15.
go back to reference Jøsang A, AlFayyadh B, Grandison T, AlZomai M, McNamara J (2007) Security usability principles for vulnerability analysis and risk assessment. In: Twenty-third annual computer security applications conference, 2007. ACSAC 2007, IEEE, pp 269–278 Jøsang A, AlFayyadh B, Grandison T, AlZomai M, McNamara J (2007) Security usability principles for vulnerability analysis and risk assessment. In: Twenty-third annual computer security applications conference, 2007. ACSAC 2007, IEEE, pp 269–278
16.
go back to reference Baker GH (2005) A vulnerability assessment methodology for critical infrastructure sites. In: DHS symposium: R and D partnerships in homeland security Baker GH (2005) A vulnerability assessment methodology for critical infrastructure sites. In: DHS symposium: R and D partnerships in homeland security
17.
go back to reference Benton K, Camp LJ, Small C (2013) Openflow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking, ACM, pp 151–152 Benton K, Camp LJ, Small C (2013) Openflow vulnerability assessment. In: Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking, ACM, pp 151–152
18.
go back to reference Ristov S, Gusev M, Donevski A (2014) Security vulnerability assessment of openstack cloud. In: 2014 sixth international conference on computational intelligence, communication systems and networks (CICSyN), IEEE, pp 95–100 Ristov S, Gusev M, Donevski A (2014) Security vulnerability assessment of openstack cloud. In: 2014 sixth international conference on computational intelligence, communication systems and networks (CICSyN), IEEE, pp 95–100
19.
go back to reference Khan S, Parkinson S, Crampton A (2017) A multi-layered cloud protection framework. In: Companion proceedings of The 10th international conference on utility and cloud computing, ACM, pp 233–238 Khan S, Parkinson S, Crampton A (2017) A multi-layered cloud protection framework. In: Companion proceedings of The 10th international conference on utility and cloud computing, ACM, pp 233–238
20.
go back to reference Gomez-Barrero M, Galbally J, Fierrez J (2014) Efficient software attack to multimodal biometric systems and its application to face and iris fusion. Pattern Recognit Lett 36:243–253CrossRef Gomez-Barrero M, Galbally J, Fierrez J (2014) Efficient software attack to multimodal biometric systems and its application to face and iris fusion. Pattern Recognit Lett 36:243–253CrossRef
21.
go back to reference Cherdantseva Y, Burnap P, Blyth A, Eden P, Jones K, Soulsby H, Stoddart K (2016) A review of cyber security risk assessment methods for scada systems. Comput Sec 56:1–27CrossRef Cherdantseva Y, Burnap P, Blyth A, Eden P, Jones K, Soulsby H, Stoddart K (2016) A review of cyber security risk assessment methods for scada systems. Comput Sec 56:1–27CrossRef
22.
go back to reference Shabtai A, Fledel Y, Kanonov U, Elovici Y, Dolev S, Glezer C (2010) Google android: a comprehensive security assessment. IEEE Sec Privacy 8(2):35–44CrossRef Shabtai A, Fledel Y, Kanonov U, Elovici Y, Dolev S, Glezer C (2010) Google android: a comprehensive security assessment. IEEE Sec Privacy 8(2):35–44CrossRef
23.
go back to reference Wang H, Zhang Y, Li J, Liu H, Yang W, Li B, Gu D (2015) Vulnerability assessment of oauth implementations in android applications. In: Proceedings of the 31st annual computer security applications conference, ACM, pp 61–70 Wang H, Zhang Y, Li J, Liu H, Yang W, Li B, Gu D (2015) Vulnerability assessment of oauth implementations in android applications. In: Proceedings of the 31st annual computer security applications conference, ACM, pp 61–70
24.
go back to reference Zhang C, Sun J, Zhu X, Fang Y (2010) Privacy and security for online social networks: challenges and opportunities. IEEE Netw 24(4) Zhang C, Sun J, Zhu X, Fang Y (2010) Privacy and security for online social networks: challenges and opportunities. IEEE Netw 24(4)
25.
go back to reference Zhao J, Zhao SY (2015) Security and vulnerability assessment of social media sites: an exploratory study. J Educ Busin 90(8):458–466CrossRef Zhao J, Zhao SY (2015) Security and vulnerability assessment of social media sites: an exploratory study. J Educ Busin 90(8):458–466CrossRef
26.
go back to reference Zhao JJ (2010) Zhao SY (2010) Opportunities and threats: a security assessment of state e-government websites. Gov Inf Q 27(1):49–56CrossRef Zhao JJ (2010) Zhao SY (2010) Opportunities and threats: a security assessment of state e-government websites. Gov Inf Q 27(1):49–56CrossRef
27.
go back to reference Barrere M, Badonnel R, Festor O (2014) Vulnerability assessment in autonomic networks and services: a survey. IEEE Commun Surv Tutor 16(2):988–1004CrossRef Barrere M, Badonnel R, Festor O (2014) Vulnerability assessment in autonomic networks and services: a survey. IEEE Commun Surv Tutor 16(2):988–1004CrossRef
28.
go back to reference Movassaghi S, Abolhasan M, Lipman J, Smith D, Jamalipour A (2014) Wireless body area networks: a survey. IEEE Commun Surv Tutor 16(3):1658–1686CrossRef Movassaghi S, Abolhasan M, Lipman J, Smith D, Jamalipour A (2014) Wireless body area networks: a survey. IEEE Commun Surv Tutor 16(3):1658–1686CrossRef
29.
go back to reference Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 6(1):19CrossRef Khan S, Parkinson S, Qin Y (2017) Fog computing security: a review of current applications and security solutions. J Cloud Comput 6(1):19CrossRef
30.
go back to reference Parkinson S, Qin Y, Khan S, Vallati M (2017) Security auditing in the fog. In: Proceedings of the second international conference on internet of things and cloud computing, ACM, p 191 Parkinson S, Qin Y, Khan S, Vallati M (2017) Security auditing in the fog. In: Proceedings of the second international conference on internet of things and cloud computing, ACM, p 191
31.
go back to reference Hahn A, Ashok A, Sridhar S, Govindarasu M (2013) Cyber-physical security testbeds: architecture, application, and evaluation for smart grid. IEEE Trans Smart Grid 4(2):847–855CrossRef Hahn A, Ashok A, Sridhar S, Govindarasu M (2013) Cyber-physical security testbeds: architecture, application, and evaluation for smart grid. IEEE Trans Smart Grid 4(2):847–855CrossRef
32.
go back to reference Kumar SA, Xu B (2017) Vulnerability assessment for security in aviation cyber-physical systems. In: 2017 IEEE 4th international conference on cyber security and cloud computing (CSCloud), IEEE, pp 145–150 Kumar SA, Xu B (2017) Vulnerability assessment for security in aviation cyber-physical systems. In: 2017 IEEE 4th international conference on cyber security and cloud computing (CSCloud), IEEE, pp 145–150
33.
go back to reference Saripalli P, Walters B (2010) Quirc: A quantitative impact and risk assessment framework for cloud security. In: 2010 IEEE 3rd international conference on cloud computing (CLOUD), IEEE, pp 280–288 Saripalli P, Walters B (2010) Quirc: A quantitative impact and risk assessment framework for cloud security. In: 2010 IEEE 3rd international conference on cloud computing (CLOUD), IEEE, pp 280–288
34.
go back to reference Hartmann, K, Steup, C (2013) The vulnerability of UAVS to cyber attacks-an approach to the risk assessment. In: 2013 5th international conference on cyber conflict (CyCon), IEEE, pp 1–23 Hartmann, K, Steup, C (2013) The vulnerability of UAVS to cyber attacks-an approach to the risk assessment. In: 2013 5th international conference on cyber conflict (CyCon), IEEE, pp 1–23
35.
go back to reference Gruss D, Maurice C, Mangard S (2016) Rowhammer. js: a remote software-induced fault attack in javascript. Detection of intrusions and malware, and vulnerability assessment. Springer, Berlin, pp 300–321 Gruss D, Maurice C, Mangard S (2016) Rowhammer. js: a remote software-induced fault attack in javascript. Detection of intrusions and malware, and vulnerability assessment. Springer, Berlin, pp 300–321
36.
go back to reference Ma S, Hellerstein JL (2001) Mining partially periodic event patterns with unknown periods. In: 17th international conference on data engineering, 2001. Proceedings, IEEE, pp 205–214 Ma S, Hellerstein JL (2001) Mining partially periodic event patterns with unknown periods. In: 17th international conference on data engineering, 2001. Proceedings, IEEE, pp 205–214
37.
go back to reference Li W (2013) Automatic log analysis using machine learning: awesome automatic log analysis version 2.0. Uppsala universitet Li W (2013) Automatic log analysis using machine learning: awesome automatic log analysis version 2.0. Uppsala universitet
38.
go back to reference Anthony R (2013) Detecting security incidents using windows workstation event logs. SANS Institute, InfoSec Reading Room Paper Anthony R (2013) Detecting security incidents using windows workstation event logs. SANS Institute, InfoSec Reading Room Paper
39.
go back to reference Mehdiyev N, Krumeich J, Enke D, Werth D, Loos P (2015) Determination of rule patterns in complex event processing using machine learning techniques. Proc Comput Sci 61:395–401CrossRef Mehdiyev N, Krumeich J, Enke D, Werth D, Loos P (2015) Determination of rule patterns in complex event processing using machine learning techniques. Proc Comput Sci 61:395–401CrossRef
40.
go back to reference Clarke-Salt J (2009) SQL injection attacks and defense. Elsevier, Amsterdam Clarke-Salt J (2009) SQL injection attacks and defense. Elsevier, Amsterdam
41.
go back to reference OWASP T (2013) Top 10-2013. The ten most critical web application security risks OWASP T (2013) Top 10-2013. The ten most critical web application security risks
42.
go back to reference Kindy DA, Pathan A-SK (2011) A survey on SQL injection: Vulnerabilities, attacks, and prevention techniques. In: 2011 IEEE 15th international symposium on consumer electronics (ISCE), IEEE, pp 468–471 Kindy DA, Pathan A-SK (2011) A survey on SQL injection: Vulnerabilities, attacks, and prevention techniques. In: 2011 IEEE 15th international symposium on consumer electronics (ISCE), IEEE, pp 468–471
43.
go back to reference Gavas E, Memon N, Britton D (2012) Winning cybersecurity one challenge at a time. IEEE Sec Privacy 10(4):75–79 Gavas E, Memon N, Britton D (2012) Winning cybersecurity one challenge at a time. IEEE Sec Privacy 10(4):75–79
44.
go back to reference Halfond WG, Orso A (2005) Amnesia: analysis and monitoring for neutralizing SQL-injection attacks. In: Proceedings of the 20th IEEE/ACM international conference on automated software engineering, ACM, pp 174–183 Halfond WG, Orso A (2005) Amnesia: analysis and monitoring for neutralizing SQL-injection attacks. In: Proceedings of the 20th IEEE/ACM international conference on automated software engineering, ACM, pp 174–183
45.
go back to reference Holik F, Horalek J, Marik O, Neradova S, Zitta S (2014) Effective penetration testing with metasploit framework and methodologies. In: 2014 IEEE 15th international symposium on computational intelligence and informatics (CINTI), IEEE, pp 237–242 Holik F, Horalek J, Marik O, Neradova S, Zitta S (2014) Effective penetration testing with metasploit framework and methodologies. In: 2014 IEEE 15th international symposium on computational intelligence and informatics (CINTI), IEEE, pp 237–242
47.
go back to reference Lyon GF (2009) Nmap network scanning: the official nmap project guide to network discovery and security scanning. Insecure, USA Lyon GF (2009) Nmap network scanning: the official nmap project guide to network discovery and security scanning. Insecure, USA
48.
go back to reference Garn B, Kapsalis I, Simos DE, Winkler S (2014) On the applicability of combinatorial testing to web application security testing: a case study. In: Proceedings of the 2014 workshop on joining academia and industry contributions to test automation and model-based testing, ACM, pp 16–21 Garn B, Kapsalis I, Simos DE, Winkler S (2014) On the applicability of combinatorial testing to web application security testing: a case study. In: Proceedings of the 2014 workshop on joining academia and industry contributions to test automation and model-based testing, ACM, pp 16–21
50.
go back to reference Chappell L, Combs G (2010) Wireshark network analysis: the official wireshark certified network analyst study guide. Chappell University, USA, Protocol Analysis Institute Chappell L, Combs G (2010) Wireshark network analysis: the official wireshark certified network analyst study guide. Chappell University, USA, Protocol Analysis Institute
51.
go back to reference Webb EM, Boscolo CD, Gilde RG (2016) Network appliance for vulnerability assessment auditing over multiple networks. Google patents. US Patent App. 15/079,224 Webb EM, Boscolo CD, Gilde RG (2016) Network appliance for vulnerability assessment auditing over multiple networks. Google patents. US Patent App. 15/079,224
52.
go back to reference Gleichauf R, Shanklin S, Waddell S, Ziese K (2001) System and method for rules-driven multi-phase network vulnerability assessment. Google patents. US Patent 6,324,656 Gleichauf R, Shanklin S, Waddell S, Ziese K (2001) System and method for rules-driven multi-phase network vulnerability assessment. Google patents. US Patent 6,324,656
53.
go back to reference Bunker N, Laizerovich D, Bunker E, Van Schuyver J (2001) Network vulnerability assessment system and method. Google patents. US Patent App. 09/861,001 Bunker N, Laizerovich D, Bunker E, Van Schuyver J (2001) Network vulnerability assessment system and method. Google patents. US Patent App. 09/861,001
54.
go back to reference Taylor P, Mewett S, Brass PC, Doty TR (2007) Vulnerability assessment and authentication of a computer by a local scanner. Google patents. US Patent 7,178,166 Taylor P, Mewett S, Brass PC, Doty TR (2007) Vulnerability assessment and authentication of a computer by a local scanner. Google patents. US Patent 7,178,166
55.
go back to reference Cooper G, Valente LFP, Pearcy DP, Richardson HA (2008) Policy-based vulnerability assessment. Google patents. US Patent 7,451,488 Cooper G, Valente LFP, Pearcy DP, Richardson HA (2008) Policy-based vulnerability assessment. Google patents. US Patent 7,451,488
56.
go back to reference Oberheide J, Song D, Goodman A (2016) System and method for assessing vulnerability of a mobile device. Google patents. US Patent 9,467,463 Oberheide J, Song D, Goodman A (2016) System and method for assessing vulnerability of a mobile device. Google patents. US Patent 9,467,463
57.
go back to reference Tyugu E (2011) Artificial intelligence in cyber defense. In: 3rd international conference on cyber conflict (ICCC), IEEE, pp 1–11 Tyugu E (2011) Artificial intelligence in cyber defense. In: 3rd international conference on cyber conflict (ICCC), IEEE, pp 1–11
58.
go back to reference Harel Y, Gal IB, Elovici Y (2017) Cyber security and the role of intelligent systems in addressing its challenges. ACM Trans Intell Syst Technol (TIST) 8(4):49 Harel Y, Gal IB, Elovici Y (2017) Cyber security and the role of intelligent systems in addressing its challenges. ACM Trans Intell Syst Technol (TIST) 8(4):49
59.
go back to reference Bareiss R (2014) Exemplar-based knowledge acquisition: a unified approach to concept representation, classification, and learning, vol 2. Academic Press, CambridgeMATH Bareiss R (2014) Exemplar-based knowledge acquisition: a unified approach to concept representation, classification, and learning, vol 2. Academic Press, CambridgeMATH
60.
go back to reference Saad K, Simon P (2016) Towards a multi-tiered knowledge-based system for autonomous cloud security auditing. AAAI Saad K, Simon P (2016) Towards a multi-tiered knowledge-based system for autonomous cloud security auditing. AAAI
61.
go back to reference Li T, Hankin C (2016) Effective defence against zero-day exploits using Bayesian networks. In: International conference on critical information infrastructures security, Springer Li T, Hankin C (2016) Effective defence against zero-day exploits using Bayesian networks. In: International conference on critical information infrastructures security, Springer
62.
go back to reference Doupé A, Cova M, Vigna G (2010) Why johnny cant pentest: an analysis of black-box web vulnerability scanners. In: International conference on detection of intrusions and malware, and vulnerability assessment, Springer, pp 111–131 Doupé A, Cova M, Vigna G (2010) Why johnny cant pentest: an analysis of black-box web vulnerability scanners. In: International conference on detection of intrusions and malware, and vulnerability assessment, Springer, pp 111–131
63.
go back to reference Edkrantz M, Said A (2015) Predicting exploit likelihood for cyber vulnerabilities with machine learning. Unpublished Masters Thesis, Chalmers Unıversıty of Technology Department of Computer Science and Engineering, Gothenburg, Sweden Edkrantz M, Said A (2015) Predicting exploit likelihood for cyber vulnerabilities with machine learning. Unpublished Masters Thesis, Chalmers Unıversıty of Technology Department of Computer Science and Engineering, Gothenburg, Sweden
64.
go back to reference Feng N, Wang HJ , Li M (2014) A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis. Inf Sci 256:57–73 Feng N, Wang HJ , Li M (2014) A security risk analysis model for information systems: causal relationships of risk factors and vulnerability propagation analysis. Inf Sci 256:57–73
65.
go back to reference de Gusmão APH , e Silva LC, Silva MM, Poleto T, Costa APCS (2016) Information security risk analysis model using fuzzy decision theory. Int J Inf Manag 36(1):25–34 de Gusmão APH , e Silva LC, Silva MM, Poleto T, Costa APCS (2016) Information security risk analysis model using fuzzy decision theory. Int J Inf Manag 36(1):25–34
66.
go back to reference Corral G, Armengol E, Fornells A, Golobardes E (2007) Data security analysis using unsupervised learning and explanations. Innovations in hybrid intelligent systems. Springer, Berlin, pp 112–119CrossRef Corral G, Armengol E, Fornells A, Golobardes E (2007) Data security analysis using unsupervised learning and explanations. Innovations in hybrid intelligent systems. Springer, Berlin, pp 112–119CrossRef
67.
go back to reference Poolsappasit N, Dewri R, Ray I (2012) Dynamic security risk management using bayesian attack graphs. IEEE Trans Depend Sec Comput 9(1):61–74CrossRef Poolsappasit N, Dewri R, Ray I (2012) Dynamic security risk management using bayesian attack graphs. IEEE Trans Depend Sec Comput 9(1):61–74CrossRef
68.
go back to reference Lo C-C, Chen W-J (2012) A hybrid information security risk assessment procedure considering interdependences between controls. Expert Syst Appl 39(1):247–257CrossRef Lo C-C, Chen W-J (2012) A hybrid information security risk assessment procedure considering interdependences between controls. Expert Syst Appl 39(1):247–257CrossRef
69.
go back to reference Bozorgi M, Saul LK, Savage S, Voelker GM (2010) Beyond heuristics: learning to classify vulnerabilities and predict exploits. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, pp 105–114 Bozorgi M, Saul LK, Savage S, Voelker GM (2010) Beyond heuristics: learning to classify vulnerabilities and predict exploits. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, ACM, pp 105–114
70.
go back to reference Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N (2012) Gritzalis S (2012) Evaluation of anomaly-based ids for mobile devices using machine learning classifiers. Secur Commun Netw 5(1):3–14CrossRef Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N (2012) Gritzalis S (2012) Evaluation of anomaly-based ids for mobile devices using machine learning classifiers. Secur Commun Netw 5(1):3–14CrossRef
71.
go back to reference Cepeda, J, Colomé, D, Castrillón N (2011) Dynamic vulnerability assessment due to transient instability based on data mining analysis for smart grid applications. In: IEEE PES conference on innovative smart grid technologies (ISGT latin America), IEEE, pp 1–7 Cepeda, J, Colomé, D, Castrillón N (2011) Dynamic vulnerability assessment due to transient instability based on data mining analysis for smart grid applications. In: IEEE PES conference on innovative smart grid technologies (ISGT latin America), IEEE, pp 1–7
72.
go back to reference Uwagbole SO, Buchanan WJ, Fan L (2017) Applied machine learning predictive analytics to SQL injection attack detection and prevention, pp 1–4 Uwagbole SO, Buchanan WJ, Fan L (2017) Applied machine learning predictive analytics to SQL injection attack detection and prevention, pp 1–4
73.
go back to reference Ndibwile JD, Govardhan A, Okada K, Kadobayashi Y (2015) Web server protection against application layer ddos attacks using machine learning and traffic authentication. In: Computer software and applications conference (COMPSAC), 2015 IEEE 39th annual, vol 3, IEEE, pp 261–267 Ndibwile JD, Govardhan A, Okada K, Kadobayashi Y (2015) Web server protection against application layer ddos attacks using machine learning and traffic authentication. In: Computer software and applications conference (COMPSAC), 2015 IEEE 39th annual, vol 3, IEEE, pp 261–267
74.
go back to reference Benjamin P (2010) System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning. Google patents. US Patent 7,784,099 Benjamin P (2010) System for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning. Google patents. US Patent 7,784,099
75.
go back to reference Titonis TH, Manohar-Alers NR, Wysopal CJ (2017) Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security. Google patents. US Patent 9,672,355 Titonis TH, Manohar-Alers NR, Wysopal CJ (2017) Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security. Google patents. US Patent 9,672,355
76.
go back to reference Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy (SP), IEEE, pp 305–316 Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy (SP), IEEE, pp 305–316
77.
go back to reference Huang L, Joseph AD, Nelson B, Rubinstein BI, Tygar J (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence, ACM, pp 43–58 Huang L, Joseph AD, Nelson B, Rubinstein BI, Tygar J (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence, ACM, pp 43–58
78.
go back to reference Grieco G, Grinblat GL, Uzal L, Rawat S, Feist J, Mounier L (2016) Toward large-scale vulnerability discovery using machine learning. In: Proceedings of the sixth ACM conference on data and application security and privacy, ACM, pp 85–96 Grieco G, Grinblat GL, Uzal L, Rawat S, Feist J, Mounier L (2016) Toward large-scale vulnerability discovery using machine learning. In: Proceedings of the sixth ACM conference on data and application security and privacy, ACM, pp 85–96
79.
go back to reference Holm H, Sommestad T, Almroth J, Persson M (2011) A quantitative evaluation of vulnerability scanning. Inf Manag Comput Secur 19(4):231–247CrossRef Holm H, Sommestad T, Almroth J, Persson M (2011) A quantitative evaluation of vulnerability scanning. Inf Manag Comput Secur 19(4):231–247CrossRef
80.
go back to reference Khan S, Parkinson S (2017) Towards automated vulnerability assessment Khan S, Parkinson S (2017) Towards automated vulnerability assessment
81.
go back to reference Ghallab M, Nau D, Traverso P (2004) Automated planning: theory and practice. Elsevier, AmsterdamMATH Ghallab M, Nau D, Traverso P (2004) Automated planning: theory and practice. Elsevier, AmsterdamMATH
82.
go back to reference McDermott D, Ghallab M, Howe A, Knoblock C, Ram A, Veloso M, Weld D, Wilkins D (1998) Pddl-the planning domain definition language McDermott D, Ghallab M, Howe A, Knoblock C, Ram A, Veloso M, Weld D, Wilkins D (1998) Pddl-the planning domain definition language
83.
go back to reference Hoffmann J (2003) The metric-ff planning system: translating “ignoring delete lists” to numeric state variables. J Artif Intell Res 20:291–341 Hoffmann J (2003) The metric-ff planning system: translating “ignoring delete lists” to numeric state variables. J Artif Intell Res 20:291–341
84.
go back to reference Valenzano R.A, Sturtevant N, Schaeffer J, Buro K, Kishimoto A (2010) Simultaneously searching with multiple settings: an alternative to parameter tuning for suboptimal single-agent search algorithms. In: Third annual symposium on combinatorial search Valenzano R.A, Sturtevant N, Schaeffer J, Buro K, Kishimoto A (2010) Simultaneously searching with multiple settings: an alternative to parameter tuning for suboptimal single-agent search algorithms. In: Third annual symposium on combinatorial search
85.
go back to reference Amos-Binks A, Clark J, Weston K, Winters M, Harfoush K (2017) Efficient attack plan recognition using automated planning. In: 2017 IEEE symposium on computers and communications (ISCC), pp 1001–1006 Amos-Binks A, Clark J, Weston K, Winters M, Harfoush K (2017) Efficient attack plan recognition using automated planning. In: 2017 IEEE symposium on computers and communications (ISCC), pp 1001–1006
86.
go back to reference Singhal A, Ou X (2017) Security risk analysis of enterprise networks using probabilistic attack graphs. Network security metrics. Springer, Berlin, pp 53–73CrossRef Singhal A, Ou X (2017) Security risk analysis of enterprise networks using probabilistic attack graphs. Network security metrics. Springer, Berlin, pp 53–73CrossRef
87.
go back to reference Kotenko I, Doynikova E (2014) Security assessment of computer networks based on attack graphs and security events. In: Information and Communication Technology-EurAsia Conference, Springer, pp 462–471 Kotenko I, Doynikova E (2014) Security assessment of computer networks based on attack graphs and security events. In: Information and Communication Technology-EurAsia Conference, Springer, pp 462–471
88.
go back to reference Boddy MS, Gohde J, Haigh T, Harp SA (2005) Course of action generation for cyber security using classical planning. In: ICAPS, pp 12–21 Boddy MS, Gohde J, Haigh T, Harp SA (2005) Course of action generation for cyber security using classical planning. In: ICAPS, pp 12–21
89.
go back to reference Riabov A, Sohrabi S, Udrea O, Hassanzadeh O (2016) Efficient high quality plan exploration for network security. In: International scheduling and planning applications workshop (SPARK) Riabov A, Sohrabi S, Udrea O, Hassanzadeh O (2016) Efficient high quality plan exploration for network security. In: International scheduling and planning applications workshop (SPARK)
91.
go back to reference Shmaryahu D (2016) Constructing plan trees for simulated penetration testing. In: The 26th international conference on automated planning and scheduling, p 121 Shmaryahu D (2016) Constructing plan trees for simulated penetration testing. In: The 26th international conference on automated planning and scheduling, p 121
93.
go back to reference Sarraute C, Buffet O, Hoffmann J (2013) Pomdps make better hackers: accounting for uncertainty in penetration testing. arXiv preprint arXiv:1307.8182 Sarraute C, Buffet O, Hoffmann J (2013) Pomdps make better hackers: accounting for uncertainty in penetration testing. arXiv preprint arXiv:​1307.​8182
94.
go back to reference Hoffmann J (2015) Simulated penetration testing: from “dijkstra” to “turing test++”. In: ICAPS, pp 364–372 Hoffmann J (2015) Simulated penetration testing: from “dijkstra” to “turing test++”. In: ICAPS, pp 364–372
95.
go back to reference Shah S, Mehtre BM (2015) An overview of vulnerability assessment and penetration testing techniques. J Comput Virol Hacking Tech 11(1):27–49CrossRef Shah S, Mehtre BM (2015) An overview of vulnerability assessment and penetration testing techniques. J Comput Virol Hacking Tech 11(1):27–49CrossRef
96.
go back to reference Sohrabi S, Udrea O, Riabov AV (2013) Hypothesis exploration for malware detection using planning. Edited By: Nicola Policella and Nilufer Onder, 29 Sohrabi S, Udrea O, Riabov AV (2013) Hypothesis exploration for malware detection using planning. Edited By: Nicola Policella and Nilufer Onder, 29
97.
go back to reference Sohrabi S, Riabov A, Udrea O, Hassanzadeh O (2016) Finding diverse high-quality plans for hypothesis generation. In: Proceedings of the 22nd European conference on artificial intelligence (ECAI) Sohrabi S, Riabov A, Udrea O, Hassanzadeh O (2016) Finding diverse high-quality plans for hypothesis generation. In: Proceedings of the 22nd European conference on artificial intelligence (ECAI)
98.
go back to reference Sarraute C, Richarte G, Lucángeli Obes J (2011) An algorithm to find optimal attack paths in nondeterministic scenarios. In: Proceedings of the 4th ACM workshop on security and artificial intelligence, ACM, pp 71–80 Sarraute C, Richarte G, Lucángeli Obes J (2011) An algorithm to find optimal attack paths in nondeterministic scenarios. In: Proceedings of the 4th ACM workshop on security and artificial intelligence, ACM, pp 71–80
99.
go back to reference Shah M, Chrpa L, Jimoh F, Kitchin D, McCluskey T, Parkinson S, Vallati M (2013) Knowledge engineering tools in planning: state-of-the-art and future challenges. Knowl Eng Plan Sched 53 Shah M, Chrpa L, Jimoh F, Kitchin D, McCluskey T, Parkinson S, Vallati M (2013) Knowledge engineering tools in planning: state-of-the-art and future challenges. Knowl Eng Plan Sched 53
100.
go back to reference Liao S-H (2005) Expert system methodologies and applicationsa decade review from 1995 to 2004. Expert Syst Appl 28(1):93–103 Liao S-H (2005) Expert system methodologies and applicationsa decade review from 1995 to 2004. Expert Syst Appl 28(1):93–103
101.
go back to reference Sharma T, Tiwari N, Kelkar D (2012) Study of difference between forward and backward reasoning. Int J Emerg Technol Adv Eng 2(10):271–273 Sharma T, Tiwari N, Kelkar D (2012) Study of difference between forward and backward reasoning. Int J Emerg Technol Adv Eng 2(10):271–273
102.
go back to reference Al-Ajlan A (2015) The comparison between forward and backward chaining. Int J Mach Learn Comput 5(2):106CrossRef Al-Ajlan A (2015) The comparison between forward and backward chaining. Int J Mach Learn Comput 5(2):106CrossRef
103.
go back to reference Uren V, Cimiano P, Iria J, Handschuh S, Vargas-Vera M, Motta E, Ciravegna F (2006) Semantic annotation for knowledge management: requirements and a survey of the state of the art. Web Semant Sci Serv agents World Wide Web 4(1):14–28CrossRef Uren V, Cimiano P, Iria J, Handschuh S, Vargas-Vera M, Motta E, Ciravegna F (2006) Semantic annotation for knowledge management: requirements and a survey of the state of the art. Web Semant Sci Serv agents World Wide Web 4(1):14–28CrossRef
104.
go back to reference Holm H, Shahzad K, Buschle M, Ekstedt M (2015) P2cysemol: Predictive, probabilistic cyber security modeling language. IEEE Trans Depend Sec Comput 12(6):626–639CrossRef Holm H, Shahzad K, Buschle M, Ekstedt M (2015) P2cysemol: Predictive, probabilistic cyber security modeling language. IEEE Trans Depend Sec Comput 12(6):626–639CrossRef
105.
go back to reference Holm H, Sommestad T, Ekstedt M, Nordstro ML (2013) Cysemol: a tool for cyber security analysis of enterprises. In: 22nd international conference and exhibition on electricity distribution (CIRED 2013), IET, pp 1–4 Holm H, Sommestad T, Ekstedt M, Nordstro ML (2013) Cysemol: a tool for cyber security analysis of enterprises. In: 22nd international conference and exhibition on electricity distribution (CIRED 2013), IET, pp 1–4
106.
go back to reference X-z Chen, J-h Li (2007) A novel vulnerability assessment system based on oval. Minimicro Syst-Shenyang- 28(9):1554 X-z Chen, J-h Li (2007) A novel vulnerability assessment system based on oval. Minimicro Syst-Shenyang- 28(9):1554
107.
go back to reference O’Reilly PD (2009) National vulnerability database (NVD) O’Reilly PD (2009) National vulnerability database (NVD)
108.
go back to reference Chen X, Zheng Q, Guan X (2008) An oval-based active vulnerability assessment system for enterprise computer networks. Inf Syst Front 10(5):573–588CrossRef Chen X, Zheng Q, Guan X (2008) An oval-based active vulnerability assessment system for enterprise computer networks. Inf Syst Front 10(5):573–588CrossRef
109.
go back to reference Wu B, Wang AJA (2011) Evmat: an oval and nvd based enterprise vulnerability modeling and assessment tool. In: Proceedings of the 49th annual southeast regional conference, ACM, pp 115–120 Wu B, Wang AJA (2011) Evmat: an oval and nvd based enterprise vulnerability modeling and assessment tool. In: Proceedings of the 49th annual southeast regional conference, ACM, pp 115–120
110.
go back to reference Ou X, Govindavajhala S, Appel AW (2005) Mulval: a logic-based network security analyzer. In: USENIX security symposium, pp 8–8, Baltimore Ou X, Govindavajhala S, Appel AW (2005) Mulval: a logic-based network security analyzer. In: USENIX security symposium, pp 8–8, Baltimore
111.
go back to reference Jajodia S, Noel S, OBerry B (2005) Topological analysis of network attack vulnerability. Managing cyber threats. Springer, Berlin, pp 247–266 Jajodia S, Noel S, OBerry B (2005) Topological analysis of network attack vulnerability. Managing cyber threats. Springer, Berlin, pp 247–266
112.
go back to reference Lippmann R, Scott C, Kratkiewicz K, Artz M, Ingols KW (2007) Network security planning architecture. Google patents. US Patent 7,194,769 Lippmann R, Scott C, Kratkiewicz K, Artz M, Ingols KW (2007) Network security planning architecture. Google patents. US Patent 7,194,769
113.
go back to reference Klir G, Yuan B (1998) Fuzzy sets and fuzzy logic, vol 4. Prentice Hall, New JerseyMATH Klir G, Yuan B (1998) Fuzzy sets and fuzzy logic, vol 4. Prentice Hall, New JerseyMATH
114.
go back to reference Aleksić A, Stefanović M, Tadić D, Arsovski S (2014) A fuzzy model for assessment of organization vulnerability. Measurement 51:214–223 Aleksić A, Stefanović M, Tadić D, Arsovski S (2014) A fuzzy model for assessment of organization vulnerability. Measurement 51:214–223
116.
go back to reference Szwed P, Skrzyński P (2014) A new lightweight method for security risk assessment based on fuzzy cognitive maps. Int J Appl Math Comput Sci 24(1):213–225 Szwed P, Skrzyński P (2014) A new lightweight method for security risk assessment based on fuzzy cognitive maps. Int J Appl Math Comput Sci 24(1):213–225
117.
go back to reference Shahriar H, Haddad H (2014) Risk assessment of code injection vulnerabilities using fuzzy logic-based system. In: Proceedings of the 29th annual ACM symposium on applied computing, ACM, pp 1164–1170 Shahriar H, Haddad H (2014) Risk assessment of code injection vulnerabilities using fuzzy logic-based system. In: Proceedings of the 29th annual ACM symposium on applied computing, ACM, pp 1164–1170
118.
go back to reference Yao Y, Ma X, Liu H, Yi J, Zhao X, Liu L (2014) A semantic knowledge base construction method for information security. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom), IEEE, pp 803–808 Yao Y, Ma X, Liu H, Yi J, Zhao X, Liu L (2014) A semantic knowledge base construction method for information security. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom), IEEE, pp 803–808
119.
go back to reference Singhal A, Wijesekera D (2010) Ontologies for modeling enterprise level security metrics. In: Proceedings of the sixth annual workshop on cyber security and information intelligence research, ACM, p 58 Singhal A, Wijesekera D (2010) Ontologies for modeling enterprise level security metrics. In: Proceedings of the sixth annual workshop on cyber security and information intelligence research, ACM, p 58
120.
go back to reference Wang JA, Guo M (2009) Security data mining in an ontology for vulnerability management. In: International joint conference on bioinformatics, systems biology and intelligent computing, 2009. IJCBS’09. IEEE, New York, pp 597–603 Wang JA, Guo M (2009) Security data mining in an ontology for vulnerability management. In: International joint conference on bioinformatics, systems biology and intelligent computing, 2009. IJCBS’09. IEEE, New York, pp 597–603
121.
go back to reference Khazai B, Kunz-Plapp T, Büscher C, Wegner A (2014) Vuwiki: an ontology-based semantic wiki for vulnerability assessments. Int J Disaster Risk Sci 5(1):55–73CrossRef Khazai B, Kunz-Plapp T, Büscher C, Wegner A (2014) Vuwiki: an ontology-based semantic wiki for vulnerability assessments. Int J Disaster Risk Sci 5(1):55–73CrossRef
122.
go back to reference Wang JA, Guo M (2009) OVM: an ontology for vulnerability management. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies, ACM, p 34 Wang JA, Guo M (2009) OVM: an ontology for vulnerability management. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies, ACM, p 34
123.
go back to reference Dietterich T (1995) Overfitting and undercomputing in machine learning. ACM Comput Surv (CSUR) 27(3):326–327CrossRef Dietterich T (1995) Overfitting and undercomputing in machine learning. ACM Comput Surv (CSUR) 27(3):326–327CrossRef
124.
go back to reference Bengio Y, Grandvalet Y (2004) No unbiased estimator of the variance of k-fold cross-validation. J Mach Learn Res 5:1089–1105MathSciNetMATH Bengio Y, Grandvalet Y (2004) No unbiased estimator of the variance of k-fold cross-validation. J Mach Learn Res 5:1089–1105MathSciNetMATH
125.
go back to reference Domingos P (2012) A few useful things to know about machine learning. Commun ACM 55(10):78–87 Domingos P (2012) A few useful things to know about machine learning. Commun ACM 55(10):78–87
126.
go back to reference Bishop CM (2006) Pattern recognition and machine learning. Springer, Berlin Bishop CM (2006) Pattern recognition and machine learning. Springer, Berlin
127.
go back to reference Li A, Shan S, Gao W (2012) Coupled bias-variance tradeoff for cross-pose face recognition. IEEE Trans Image Process 21(1):305–315 Li A, Shan S, Gao W (2012) Coupled bias-variance tradeoff for cross-pose face recognition. IEEE Trans Image Process 21(1):305–315
128.
go back to reference Srivastava N, Hinton GE, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15(1):1929–1958MathSciNetMATH Srivastava N, Hinton GE, Krizhevsky A, Sutskever I, Salakhutdinov R (2014) Dropout: a simple way to prevent neural networks from overfitting. J Mach Learn Res 15(1):1929–1958MathSciNetMATH
129.
go back to reference Le QV (2013) Building high-level features using large scale unsupervised learning. In: 2013 IEEE international conference on acoustics, speech and signal processing (ICASSP), IEEE, pp 8595–8598 Le QV (2013) Building high-level features using large scale unsupervised learning. In: 2013 IEEE international conference on acoustics, speech and signal processing (ICASSP), IEEE, pp 8595–8598
130.
go back to reference Angelov P (2012) Autonomous learning systems: from data streams to knowledge in real-time. Wiley, New JerseyCrossRef Angelov P (2012) Autonomous learning systems: from data streams to knowledge in real-time. Wiley, New JerseyCrossRef
131.
go back to reference Zhuo HH (2015) Crowdsourced action-model acquisition for planning. In: AAAI, pp 3439–3446 Zhuo HH (2015) Crowdsourced action-model acquisition for planning. In: AAAI, pp 3439–3446
132.
go back to reference Long K, Radhakrishnan J, Shah R, Ram A (2009) Learning from human demonstrations for real-time case-based planning Long K, Radhakrishnan J, Shah R, Ram A (2009) Learning from human demonstrations for real-time case-based planning
133.
go back to reference Khan S, Parkinson S (2017) Causal connections mining within security event logs. In: The 9th international conference on knowledge capture, ACM Khan S, Parkinson S (2017) Causal connections mining within security event logs. In: The 9th international conference on knowledge capture, ACM
134.
go back to reference Zhu Y, Fathi A, Fei-Fei L (2014) Reasoning about object affordances in a knowledge base representation. In: European conference on computer vision, pp 408–424, Springer Zhu Y, Fathi A, Fei-Fei L (2014) Reasoning about object affordances in a knowledge base representation. In: European conference on computer vision, pp 408–424, Springer
135.
go back to reference Neelakantan A, Roth B, McCallum A (2015) Compositional vector space models for knowledge base inference. In: 2015 AAAI spring symposium series Neelakantan A, Roth B, McCallum A (2015) Compositional vector space models for knowledge base inference. In: 2015 AAAI spring symposium series
Metadata
Title
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence
Authors
Saad Khan
Simon Parkinson
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_1

Premium Partner