Aggregation and Evaluation of Vulnerabilities from CVE Databases for Effective Security Assessment
| but.event.date | 29.04.2025 | cs |
| but.event.title | STUDENT EEICT 2025 | cs |
| dc.contributor.author | Tuček, Adam | |
| dc.contributor.author | Lazarov, Willi | |
| dc.date.accessioned | 2025-07-30T10:03:09Z | |
| dc.date.available | 2025-07-30T10:03:09Z | |
| dc.date.issued | 2025 | cs |
| dc.description.abstract | As digital technologies evolve, cyber threats continue to increase, often due to vulnerabilities in modern systems. This situation has led to the establishment of open databases and standardized methods for classifying, categorizing, and assessing software vulnerabilities. This paper addresses the domain of Common Vulnerabilities and Exposures (CVE) and introduces an innovative solution for aggregating CVE records to support security assessment and reporting. | en |
| dc.format | text | cs |
| dc.format.extent | 108-111 | cs |
| dc.format.mimetype | application/pdf | en |
| dc.identifier.citation | Proceedings II of the 31st Conference STUDENT EEICT 2025: Selected papers. s. 108-111. ISBN 978-80-214-6320-2 | cs |
| dc.identifier.doi | 10.13164/eeict.2025.108 | |
| dc.identifier.isbn | 978-80-214-6320-2 | |
| dc.identifier.issn | 2788-1334 | |
| dc.identifier.uri | https://hdl.handle.net/11012/255330 | |
| dc.language.iso | en | cs |
| dc.publisher | Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologií | cs |
| dc.relation.ispartof | Proceedings II of the 31st Conference STUDENT EEICT 2025: Selected papers | en |
| dc.relation.uri | https://www.eeict.cz/eeict_download/archiv/sborniky/EEICT_2025_sbornik_2.pdf | cs |
| dc.rights | © Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologií | cs |
| dc.rights.access | openAccess | en |
| dc.subject | CVE | en |
| dc.subject | CWE | en |
| dc.subject | CVSS | en |
| dc.subject | CPE | en |
| dc.subject | vulnerabilities | en |
| dc.title | Aggregation and Evaluation of Vulnerabilities from CVE Databases for Effective Security Assessment | en |
| dc.type.driver | conferenceObject | en |
| dc.type.status | Peer-reviewed | en |
| dc.type.version | publishedVersion | en |
| eprints.affiliatedInstitution.department | Fakulta elektrotechniky a komunikačních technologií | cs |
Files
Original bundle
1 - 1 of 1
