References
- CVE Details. Browse Vulnerabilities By Date [Internet]. Available: https://www.cvedetails.com/browse-by-date.php.
- MITRE ATT&CK. Enterprise tactics [Internet]. Available: https://attack.mitre.org/tactics/enterprise/.
- Towards Data Science. Topic Modeling in Python: Latent Dirichlet Allocation (LDA) [Internet]. Available: https://towardsdatascience.com/end-to-end-topic-modelingin-python-latent-dirichlet-allocation-lda-35ce4ed6b3e0.
- LearnDataSci. Jaccard Similarity [Internet]. Available: https://www.learndatasci.com/glossary/jaccard-similarity/.
- H. Chen, J. Liu, R. Liu, N. Park, and V. S. Subrahmanian, "VEST: A System for Vulnerability Exploit Scoring & Timing," in Proceeding of the Twenty-Eighth International Joint Conference on Artificial Intelligence, Macao, China, pp. 6503-6505, 2019. DOI: 10.24963/ijcai.2019/937.
- M. C. Kim, S. Oh, H. Kang, J. Kim, and H. K. Kim, "Risk Scoring System for Software Vulnerability Using Public Vulnerability Information," Journal of the Korea Institute of Information Security & Cryptology, vol. 28, no. 6, pp. 1449-1461, Dec. 2018. DOI: 10.13089/JKIISC.2018.28.6.1449.
- H. H. Jin and H. K. Kim, "A Study on Web Vulnerability Risk Assessment Model Based on Attack Results: Focused on Cyber Kill Chain," Journal of the Korea Institute of Information Security & Cryptology, vol. 31, no. 4, pp. 779-791, Aug. 2021. DOI: 10.13089/JKIISC.2021.31.4.779.
- C. Park, "Vulnerability Risk Computation method for Attack Graph Generation," in Proceedings of the Korean Institute of Communication Sciences Conference, Jeju, Korea, pp. 123-124, 2016. DOI: 10.17662/ksdim.2020.16.1.079.
- H. -G. Chae, G. -H. Lee, and J. -Y. Lee, "Analysis of Domestic and Foreign Financial Security Research Activities and Trends through Topic Modeling Analysis," Journal of the Korea Industrial Information Systems Research, vol. 26, no. 1, pp. 83-95, Feb. 2021. DOI: 10.9723/jksiis.2021.26.1.083.
- S. U. Lee and J. Lee, "Topic Modeling to Identify Cloud Security Trends using news Data Before and After the COVID-19 Pandemic," Convergence Security Journal, vol. 22, no. 2, pp. 67-75, Jun. 2022. DOI: 10.33778/kcsa.2022.22.1.067.
- H. S. Choi, W. S. Lee, and S. Y. Sohn, "Analyzing Research Trends in Personal Information Privacy Using Topic Modeling," Computers & Security, vol. 67, pp. 244-253, Jun. 2017. DOI: 10.1016/j.cose.2017.03.007Get rights and content.
- The MITRE Corp. Download CVE List [Internet]. Available: https://cve.mitre.org/data/downloads/index.html.
- Pythonspot. NLTK stop words [Internet]. Available: https://pythonspot.com/nltk-stop-words/.
- S. Cho, Y. Park, K. Lee, C. Choi, C. Shin, and K. Lee, "An APT Attack Scoring Method Using MITRE ATT&CK," Journal of the Korea Institute of Information Security & Cryptology, vol. 32, no. 4, pp. 673-689, Aug. 2022. DOI: 10.13089/JKIISC.2022.32.4.673.
- The Hacker News. CISA Warns of Hackers Exploiting Recent Zoho ManageEngine Vulnerability [Internet]. Available: https://thehackernews.com/2022/09/cisa-warns-of-hackersexploiting-recent.html.
- The Hacker News. Unpatched Java Spring Framework 0-Day RCE Bug Threatens Enterprise Web Apps Security [Internet]. Available: https://thehackernews.com/2022/03/unpatched-java-spring-framework-0-day.html.
- The Hacker News. Hackers Exploiting Unpatched Critical Atlassian Confluence Zero-Day Vulnerability [Internet]. Available: https://thehackernews.com/2022/06/hackersexploiting-unpatched-critical.html.
- The Hacker News. Critical VMware Workspace ONE Access Flaw Under Active Exploitation in the Wild [Internet]. Available: https://thehackernews.com/2022/04/vmware-releases-patches-for-critical.html.
- The Hacker News. CISA Orders Federal Agencies to Patch Actively Exploited Windows Vulnerability [Internet]. Available: https://thehackernews.com/2022/02/cisa-ordersfederal-agencies-to-patch.html.