Alert button
Picture for Najwa Aaraj

Najwa Aaraj

Alert button

Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses

Add code
Bookmark button
Alert button
Apr 13, 2023
Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare

Figure 1 for Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses
Figure 2 for Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses
Figure 3 for Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses
Figure 4 for Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses
Viaarxiv icon

Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

Add code
Bookmark button
Alert button
Aug 07, 2021
Tanujay Saha, Najwa Aaraj, Niraj K. Jha

Figure 1 for Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems
Figure 2 for Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems
Figure 3 for Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems
Figure 4 for Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems
Viaarxiv icon

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Add code
Bookmark button
Alert button
Jan 07, 2021
Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha

Figure 1 for SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
Figure 2 for SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
Figure 3 for SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
Figure 4 for SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning
Viaarxiv icon