ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. シンポジウム
  2. シンポジウムシリーズ
  3. コンピュータセキュリティシンポジウム
  4. 2023

A model for automation of vulnerability summary generation by information identification, extraction, and aggregation from multiple sources

https://ipsj.ixsq.nii.ac.jp/records/228727
https://ipsj.ixsq.nii.ac.jp/records/228727
2ddc684f-02fa-4e20-9d46-b69f11cbc20e
名前 / ファイル ライセンス アクション
IPSJ-CSS2023114.pdf IPSJ-CSS2023114.pdf (945.7 kB)
 2025年10月23日からダウンロード可能です。
Copyright (c) 2023 by the Information Processing Society of Japan
非会員:¥660, IPSJ:学会員:¥330, CSEC:会員:¥0, SPT:会員:¥0, DLIB:会員:¥0
Item type Symposium(1)
公開日 2023-10-23
タイトル
タイトル A model for automation of vulnerability summary generation by information identification, extraction, and aggregation from multiple sources
タイトル
言語 en
タイトル A model for automation of vulnerability summary generation by information identification, extraction, and aggregation from multiple sources
言語
言語 eng
キーワード
主題Scheme Other
主題 Vulnerability management, automation, information aggregation, auto-summarization, NLP
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_5794
資源タイプ conference paper
著者所属
Hitachi Ltd
著者所属
Hitachi Ltd
著者所属
Hitachi Ltd
著者所属
Hitachi Ltd
著者所属(英)
en
Hitachi Ltd
著者所属(英)
en
Hitachi Ltd
著者所属(英)
en
Hitachi Ltd
著者所属(英)
en
Hitachi Ltd
著者名 Ashokkumar, Chettymani

× Ashokkumar, Chettymani

Ashokkumar, Chettymani

Search repository
Nobuyoshi, Morita

× Nobuyoshi, Morita

Nobuyoshi, Morita

Search repository
Momoka, Kasuya

× Momoka, Kasuya

Momoka, Kasuya

Search repository
Hiroki, Yamazaki

× Hiroki, Yamazaki

Hiroki, Yamazaki

Search repository
著者名(英) Ashokkumar, Chettymani

× Ashokkumar, Chettymani

en Ashokkumar, Chettymani

Search repository
Nobuyoshi, Morita

× Nobuyoshi, Morita

en Nobuyoshi, Morita

Search repository
Momoka, Kasuya

× Momoka, Kasuya

en Momoka, Kasuya

Search repository
Hiroki, Yamazaki

× Hiroki, Yamazaki

en Hiroki, Yamazaki

Search repository
論文抄録
内容記述タイプ Other
内容記述 Defending the IT/OT assets of an organization from cyber-attacks and addressing the vulnerability is a critical operation for Incident Response Team. To achieve it, the team has to collect, process, and understand various key aspects like attack type, patch, affected products, etc., from various trusted resources. This process is a time-consuming process and heavily relies on the skill sets of the security analyst. To address this challenge, we propose an automated model for identifying, extracting, and aggregating crucial cybersecurity information into a one-page summary. The model utilizes cybersecurity keywords to identify and extract the information from multiple sources, then combine them to generate a single page summary using NLP.
論文抄録(英)
内容記述タイプ Other
内容記述 Defending the IT/OT assets of an organization from cyber-attacks and addressing the vulnerability is a critical operation for Incident Response Team. To achieve it, the team has to collect, process, and understand various key aspects like attack type, patch, affected products, etc., from various trusted resources. This process is a time-consuming process and heavily relies on the skill sets of the security analyst. To address this challenge, we propose an automated model for identifying, extracting, and aggregating crucial cybersecurity information into a one-page summary. The model utilizes cybersecurity keywords to identify and extract the information from multiple sources, then combine them to generate a single page summary using NLP.
書誌情報 コンピュータセキュリティシンポジウム2023論文集

p. 834-840, 発行日 2023-10-23
出版者
言語 ja
出版者 情報処理学会
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-19 11:44:44.646972
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3