loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Slim Trabelsi 1 ; Henrik Plate 1 ; Amine Abida 1 ; M. Marouane Ben Aoun 1 ; Anis Zouaoui 2 ; Chedy Missaoui 2 ; Sofien Gharbi 2 and Alaeddine Ayari 2

Affiliations: 1 SAP Labs France, France ; 2 ESPRIT, Tunisia

Keyword(s): Vulnerability, Social, Networks, Zero-day, Monitoring, Data Mining, CVE.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Information and Systems Security ; Intrusion Detection & Prevention ; Security Management ; Software Security

Abstract: Monitoring software vulnerability information requires an important financial and human effort in order to track all the scattered sources publishing the last news about software vulnerabilities, patches and exploits. We noticed that in some social networks like Twitter we can aggregate a lot of information related to software vulnerabilities in a single channel. In this paper, we analyse the Twitter feed in order to monitor most of the information related to software vulnerabilities including zero-day publications.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.14.132.214

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Trabelsi, S.; Plate, H.; Abida, A.; Ben Aoun, M.; Zouaoui, A.; Missaoui, C.; Gharbi, S. and Ayari, A. (2015). Monitoring Software Vulnerabilities through Social Networks Analysis. In Proceedings of the 12th International Conference on Security and Cryptography (ICETE 2015) - SECRYPT; ISBN 978-989-758-117-5; ISSN 2184-3236, SciTePress, pages 236-242. DOI: 10.5220/0005538602360242

@conference{secrypt15,
author={Slim Trabelsi. and Henrik Plate. and Amine Abida. and M. Marouane {Ben Aoun}. and Anis Zouaoui. and Chedy Missaoui. and Sofien Gharbi. and Alaeddine Ayari.},
title={Monitoring Software Vulnerabilities through Social Networks Analysis},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography (ICETE 2015) - SECRYPT},
year={2015},
pages={236-242},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005538602360242},
isbn={978-989-758-117-5},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the 12th International Conference on Security and Cryptography (ICETE 2015) - SECRYPT
TI - Monitoring Software Vulnerabilities through Social Networks Analysis
SN - 978-989-758-117-5
IS - 2184-3236
AU - Trabelsi, S.
AU - Plate, H.
AU - Abida, A.
AU - Ben Aoun, M.
AU - Zouaoui, A.
AU - Missaoui, C.
AU - Gharbi, S.
AU - Ayari, A.
PY - 2015
SP - 236
EP - 242
DO - 10.5220/0005538602360242
PB - SciTePress