
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Predicting CVSS Metric via Description Interpretation
Joana C. Costa, Tiago Roxo, João B. F. Sequeiros, et al.
IEEE Access (2022) Vol. 10, pp. 59125-59134
Open Access | Times Cited: 21
Joana C. Costa, Tiago Roxo, João B. F. Sequeiros, et al.
IEEE Access (2022) Vol. 10, pp. 59125-59134
Open Access | Times Cited: 21
Showing 21 citing articles:
CVE Severity Prediction From Vulnerability Description - A Deep Learning Approach
A. Manjunatha, Kethan Kota, Anoop S. Babu, et al.
Procedia Computer Science (2024) Vol. 235, pp. 3105-3117
Open Access | Times Cited: 2
A. Manjunatha, Kethan Kota, Anoop S. Babu, et al.
Procedia Computer Science (2024) Vol. 235, pp. 3105-3117
Open Access | Times Cited: 2
XLNet-Based Prediction Model for CVSS Metric Values
Fan Shi, Shaofeng Kai, Jinghua Zheng, et al.
Applied Sciences (2022) Vol. 12, Iss. 18, pp. 8983-8983
Open Access | Times Cited: 10
Fan Shi, Shaofeng Kai, Jinghua Zheng, et al.
Applied Sciences (2022) Vol. 12, Iss. 18, pp. 8983-8983
Open Access | Times Cited: 10
Text Document Clustering Using Chaotic Northern Goshawk Optimization with K-means Algorithm
Ratnam Dodda, A. Suresh Babu
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 3, pp. 720-731
Open Access | Times Cited: 1
Ratnam Dodda, A. Suresh Babu
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 3, pp. 720-731
Open Access | Times Cited: 1
EU space security–An 8-Step online discourse analysis to decode hybrid threats
Jo�ão Reis
PLoS ONE (2024) Vol. 19, Iss. 7, pp. e0303524-e0303524
Open Access | Times Cited: 1
Jo�ão Reis
PLoS ONE (2024) Vol. 19, Iss. 7, pp. e0303524-e0303524
Open Access | Times Cited: 1
Helping CNAs Generate CVSS Scores Faster and More Confidently Using XAI
Elyes Manai, Mohamed Mejri, Jaouhar Fattahi
Applied Sciences (2024) Vol. 14, Iss. 20, pp. 9231-9231
Open Access | Times Cited: 1
Elyes Manai, Mohamed Mejri, Jaouhar Fattahi
Applied Sciences (2024) Vol. 14, Iss. 20, pp. 9231-9231
Open Access | Times Cited: 1
VulDistilBERT: A CPS Vulnerability Severity Prediction Method Based on Distillation Model
Shaofeng Kai, Fan Shi, Jinghua Zheng
Security and Communication Networks (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 3
Shaofeng Kai, Fan Shi, Jinghua Zheng
Security and Communication Networks (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 3
Comprehensive vulnerability aspect extraction
Qindong Li, Wenyi Tang, Xingshu Chen, et al.
Applied Intelligence (2024) Vol. 54, Iss. 3, pp. 2881-2899
Closed Access
Qindong Li, Wenyi Tang, Xingshu Chen, et al.
Applied Intelligence (2024) Vol. 54, Iss. 3, pp. 2881-2899
Closed Access
VCGERG
Yashu Liu, Xiaoyi Zhao, Xiaohua Qiu, et al.
International Journal of Information Security and Privacy (2024) Vol. 18, Iss. 1, pp. 1-21
Open Access
Yashu Liu, Xiaoyi Zhao, Xiaohua Qiu, et al.
International Journal of Information Security and Privacy (2024) Vol. 18, Iss. 1, pp. 1-21
Open Access
Reciprocating Encoder Portrayal From Reliable Transformer Dependent Bidirectional Long Short-Term Memory for Question and Answering Text Classification
Suguna Marappan, K. S. Sakunthala Prabha
IEEE Access (2024) Vol. 12, pp. 117800-117811
Open Access
Suguna Marappan, K. S. Sakunthala Prabha
IEEE Access (2024) Vol. 12, pp. 117800-117811
Open Access
A comprehensive review on the application of CVSS 4.0 and deep learning in vulnerability
Hongyu Xie
Applied and Computational Engineering (2024) Vol. 87, Iss. 1, pp. 234-240
Open Access
Hongyu Xie
Applied and Computational Engineering (2024) Vol. 87, Iss. 1, pp. 234-240
Open Access
Comparison of Methods for Automatically Predicting CVSS Base Vector
Sho Isogai, Shinpei Ogata, Yutaro Kashiwa, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2024), pp. 1029-1034
Closed Access
Sho Isogai, Shinpei Ogata, Yutaro Kashiwa, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2024), pp. 1029-1034
Closed Access
Alert Prioritisation in Security Operations Centres: A Systematic Survey on Criteria and Methods
Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, et al.
ACM Computing Surveys (2024)
Closed Access
Fatemeh Jalalvand, Mohan Baruwal Chhetri, Surya Nepal, et al.
ACM Computing Surveys (2024)
Closed Access
Ai-enabled automated common vulnerability scoring from common vulnerabilities and exposures descriptions
Zijing Zhang, Vimal Kumar, Bernhard Pfahringer, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Zijing Zhang, Vimal Kumar, Bernhard Pfahringer, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Toward Extracting Learning Pattern: A Comparative Study of GPT-4o-mini and BERT Models in Predicting CVSS Base Vectors
Sho Isogai, Shinpei Ogata, Yutaro Kashiwa, et al.
(2024), pp. 127-134
Closed Access
Sho Isogai, Shinpei Ogata, Yutaro Kashiwa, et al.
(2024), pp. 127-134
Closed Access
How Context Impacts Vulnerability Severity: An Analysis of Product-Specific CVSS Scores
Lucas Lima Coutinho, Daniel Sadoc Menasché, Lucas Miranda, et al.
(2024), pp. 17-27
Closed Access
Lucas Lima Coutinho, Daniel Sadoc Menasché, Lucas Miranda, et al.
(2024), pp. 17-27
Closed Access
HAL 9000: a Risk Manager for ITSs
Tadeu Freitas, Carlos Novo, João Soares, et al.
(2024), pp. 322-331
Closed Access
Tadeu Freitas, Carlos Novo, João Soares, et al.
(2024), pp. 322-331
Closed Access
The Flaw Within: Identifying CVSS Score Discrepancies in the NVD
Siqi Zhang, Minjie Cai, Mengyuan Zhang, et al.
(2023)
Closed Access | Times Cited: 1
Siqi Zhang, Minjie Cai, Mengyuan Zhang, et al.
(2023)
Closed Access | Times Cited: 1
Assessing Vulnerability from Its Description
Zijing Zhang, Vimal Kumar, Michael Mayo, et al.
Communications in computer and information science (2023), pp. 129-143
Closed Access
Zijing Zhang, Vimal Kumar, Michael Mayo, et al.
Communications in computer and information science (2023), pp. 129-143
Closed Access
Research on intelligent recognition method of software vulnerability severity based on event extraction
Xiaoxue Wu, Shenwei Wen, Hui Lin, et al.
Research Square (Research Square) (2023)
Open Access
Xiaoxue Wu, Shenwei Wen, Hui Lin, et al.
Research Square (Research Square) (2023)
Open Access
CVSS Base Score Prediction Using an Optimized Machine Learning Scheme
Dinesh T. Vasireddy, Dakota S. Dale, Qinghua Li
(2023), pp. 1-6
Closed Access
Dinesh T. Vasireddy, Dakota S. Dale, Qinghua Li
(2023), pp. 1-6
Closed Access