PPT-Predicting zero-day software vulnerabilities through data mining
Author : yoshiko-marsland | Published Date : 2018-02-27
Su Zhang Department of Computing and Information Science Kansas State University 1 Outline Motivation Related work Proposed approach Possible techniques Plan 2 Outline
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Predicting zero-day software vulnerabili..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Predicting zero-day software vulnerabilities through data mining: Transcript
Su Zhang Department of Computing and Information Science Kansas State University 1 Outline Motivation Related work Proposed approach Possible techniques Plan 2 Outline Motivation Related work. CS . 795/895. References. . Reference 1. Big List of Information Security Vulnerabilities, John . Spacey, 2011 . http://. simplicable.com/new/the-big-list-of-information-security-vulnerabilities. Reference 2. Top Ten Database Security Threats, . Chapter. 15 : . Attacking. . Compiled. Applications. Alexis Kirat - International Student. Native . execution. . environment. Vs. . Compiled. . execution. . environment. The majority of web applications are now written using languages and platforms that run in a managed execution environment in which classic vulnerabilities . CS . 795/895. References. . Reference 1. Big List of Information Security Vulnerabilities, John . Spacey, 2011 . http://. simplicable.com/new/the-big-list-of-information-security-vulnerabilities. Reference 2. Top Ten Database Security Threats, . Su Zhang. Department of Computing and Information Science. Kansas State University. 1. Outline. Motivation.. Related work.. Proposed approach.. Possible techniques.. Plan.. 2. Outline. Motivation.. Related work.. Concrete Vulnerability Demonstrations for Software Engineering Undergraduates. Andy Meneely . and Samuel . Lucidi. Department of Software Engineering. Rochester Institute of Technology. Software Must Be Secure!. Principles for Industrial Data Mining. Paper Authored By:. Menzies. & . Kocaganeli. – Lane . Dept. of CS/EE, WVU. Bird, Zimmerman, & Schulte – Microsoft Research. Presentation By: . Ebeid. CS240A . notes by C. . Zaniolo. Most Popular Data Mining Software. Rexer. Analytics Survey (Early 2007) . asked about the tools used often and occasionally. Clearly more popular than the rest were:. --Third Presentation. Su Zhang. 1. Outline. Quick Review.. Data Source – NVD.. Data Preprocessing.. Experimental Results.. An Essential Limitation.. An Alternative Feature.. Conclusion.. Future Work.. CS . 795/895. References. . Reference 1. Big List of Information Security Vulnerabilities, John . Spacey, 2011 . http://. simplicable.com/new/the-big-list-of-information-security-vulnerabilities. Reference 2. Top Ten Database Security Threats, . CS . 795/895. References. . Reference 1. Big List of Information Security Vulnerabilities, John . Spacey, 2011 . http://. simplicable.com/new/the-big-list-of-information-security-vulnerabilities. Reference 2. Top Ten Database Security Threats, . -- . Mohammed Ayub. References. Sports Data Mining- Springer by Robert . P. . Schumaker. , Osama . K. . Solieman. , . Hsinchun. Chen. http. ://dataminingsoccer.com/en/data-download. /. . - Historical Soccer . a Vulnerability Management Program. Michael Zimmer. Information Security Analyst, Northern Arizona University. Grant Johnson. Technical Account Manager, Qualys. Who Are We. Why Vulnerability Management?. WEKA WEKA By Susan L. Miertschin 1 Data Mining Data Mining Task Types Numerous Algorithms Task Types Numerous Algorithms Classification Clustering C4.5 Decision Tree K Means Clustering Clustering Disc THE TO GPU/CRYPTO MINING CONTENTS Page 1 Page 2 Page 4 Page 7 Page 9 Page 11 Page 13 Page 15 Page 16 Page 17 Page 19 Page 20 Introduction Buy your own rig or rent it out? How to build a rig GPU
Download Document
Here is the link to download the presentation.
"Predicting zero-day software vulnerabilities through data mining"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents