{"id":"https://openalex.org/W2052029850","doi":"https://doi.org/10.1093/comjnl/bxp040","title":"A Categorization Framework for Common Computer Vulnerabilities and Exposures","display_name":"A Categorization Framework for Common Computer Vulnerabilities and Exposures","publication_year":2009,"publication_date":"2009-05-07","ids":{"openalex":"https://openalex.org/W2052029850","doi":"https://doi.org/10.1093/comjnl/bxp040","mag":"2052029850"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxp040","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxp040","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101514992","display_name":"Zeyu Chen","orcid":"https://orcid.org/0009-0000-1516-038X"},"institutions":[{"id":"https://openalex.org/I4210134091","display_name":"Yahoo (United States)","ror":"https://ror.org/040dkzz12","country_code":"US","type":"company","lineage":["https://openalex.org/I4210134091"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Z. Chen","raw_affiliation_strings":["ProMetrics Inc., King of Prussia, PA 19406, USA","Yahoo! Inc., Santa Clara, CA 95054, USA"],"affiliations":[{"raw_affiliation_string":"ProMetrics Inc., King of Prussia, PA 19406, USA","institution_ids":[]},{"raw_affiliation_string":"Yahoo! Inc., Santa Clara, CA 95054, USA","institution_ids":["https://openalex.org/I4210134091"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100368759","display_name":"Yuan Zhang","orcid":"https://orcid.org/0000-0003-1693-0889"},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Y. Zhang","raw_affiliation_strings":["Florida State University, Tallahassee, FL 32306, USA","\u2021Florida State University, Tallahassee, FL 32306, USA ("],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL 32306, USA","institution_ids":["https://openalex.org/I103163165"]},{"raw_affiliation_string":"\u2021Florida State University, Tallahassee, FL 32306, USA (","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101514992","display_name":"Zeyu Chen","orcid":"https://orcid.org/0009-0000-1516-038X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Z. Chen","raw_affiliation_strings":["ProMetrics Inc., King of Prussia, PA 19406, USA"],"affiliations":[{"raw_affiliation_string":"ProMetrics Inc., King of Prussia, PA 19406, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101514992"],"corresponding_institution_ids":["https://openalex.org/I4210134091"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.7278,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.73198618,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"53","issue":"5","first_page":"551","last_page":"580"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8520941734313965},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.7396790385246277},{"id":"https://openalex.org/keywords/categorization","display_name":"Categorization","score":0.723939061164856},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6617183685302734},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.5783637762069702},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.47899195551872253},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.44884783029556274},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4486348032951355},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4167581796646118},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.31297850608825684},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2239435613155365},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.13275638222694397},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.07563096284866333}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8520941734313965},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.7396790385246277},{"id":"https://openalex.org/C94124525","wikidata":"https://www.wikidata.org/wiki/Q912550","display_name":"Categorization","level":2,"score":0.723939061164856},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6617183685302734},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.5783637762069702},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47899195551872253},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.44884783029556274},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4486348032951355},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4167581796646118},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.31297850608825684},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2239435613155365},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.13275638222694397},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.07563096284866333},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxp040","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxp040","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2906845177","https://openalex.org/W4200107511","https://openalex.org/W2891427086","https://openalex.org/W1968625315","https://openalex.org/W4385719733","https://openalex.org/W3085047896","https://openalex.org/W2979496624","https://openalex.org/W2297096600","https://openalex.org/W2241929320","https://openalex.org/W3200895730"],"abstract_inverted_index":{"The":[0,173],"dictionary":[1,42,74],"of":[2,11,23,30,35,55,98,103,150,185,196,206,221],"common":[3],"vulnerabilities":[4,53],"and":[5,26,37,128,130,143,157,162],"exposures":[6],"(CVEs)":[7],"is":[8,17],"a":[9,64,76,159,193,218],"compilation":[10],"known":[12],"security":[13,188,207,232],"loopholes":[14,189,233],"whose":[15],"objective":[16],"to":[18,47,85,137,146,165,169,235],"both":[19],"facilitate":[20],"the":[21,41,73,96,101,148,151,178,183,186,203,224,237],"exchange":[22],"security-related":[24],"information":[25],"expedite":[27],"vulnerability":[28,123],"analysis":[29],"computer":[31],"systems.":[32],"Its":[33],"lack":[34],"categorization":[36,66],"generalization":[38],"capability":[39],"renders":[40],"ineffective":[43],"when":[44],"it":[45,199],"comes":[46],"developing":[48],"defense":[49],"strategies":[50],"for":[51,112],"clustered":[52],"instead":[54],"individual":[56],"exploits.":[57],"To":[58],"address":[59],"this":[60],"issue,":[61],"we":[62],"propose":[63],"CVE":[65,69,107,131,174,225],"framework":[67,180],"termed":[68],"Classifier":[70,108,226],"that":[71,78,182,202,229],"transforms":[72],"into":[75],"classifier":[77],"not":[79],"only":[80],"categorizes":[81],"CVEs":[82,156,238],"with":[83],"respect":[84],"diverse":[86],"taxonomic":[87,113,138],"features":[88,114],"but":[89],"can":[90],"also":[91],"evaluate":[92],"general":[93],"trends":[94],"in":[95],"evolution":[97],"vulnerabilities.":[99,222],"With":[100],"help":[102],"support":[104],"vector":[105],"machines,":[106],"builds":[109],"learning":[110],"models":[111],"based":[115],"on":[116],"training":[117],"data":[118,160,167],"automatically":[119],"extracted":[120],"from":[121],"pertinent":[122],"databases":[124],"including":[125],"BID,":[126],"X-Force":[127],"Secunia,":[129],"entries":[132],"containing":[133],"telltale":[134],"keywords":[135],"unique":[136],"features.":[139],"We":[140],"use":[141],"word-stemming":[142],"stopword-removal":[144],"techniques":[145],"reduce":[147],"dimensions":[149],"feature":[152],"space":[153],"formed":[154],"by":[155,177,192],"develop":[158],"fusion":[161],"cleansing":[163],"process":[164],"eliminate":[166],"inconsistencies":[168],"improve":[170],"classification":[171,175],"performance.":[172],"produced":[176],"proposed":[179],"reveals":[181],"majority":[184],"Internet":[187],"are":[190],"harbored":[191],"small":[194],"set":[195],"services.":[197],"Moreover,":[198],"becomes":[200],"evident":[201],"widespread":[204],"deployment":[205],"devices":[208,216],"provides":[209],"many":[210],"additional":[211],"attack":[212],"points":[213,227],"as":[214],"such":[215],"demonstrate":[217],"great":[219],"mount":[220],"Finally,":[223],"out":[228],"remotely":[230],"exploitable":[231],"continue":[234],"dominate":[236],"landscape.":[239]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
