{"id":"https://openalex.org/W4382052872","doi":"https://doi.org/10.1109/icccs57501.2023.10150856","title":"CVE Records of Known Exploited Vulnerabilities","display_name":"CVE Records of Known Exploited Vulnerabilities","publication_year":2023,"publication_date":"2023-04-21","ids":{"openalex":"https://openalex.org/W4382052872","doi":"https://doi.org/10.1109/icccs57501.2023.10150856"},"language":"en","primary_location":{"id":"doi:10.1109/icccs57501.2023.10150856","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccs57501.2023.10150856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/CVE_Records_of_Known_Exploited_Vulnerabilities/24202008","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jackson Lim","orcid":null},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Jackson Lim","raw_affiliation_strings":["Singapore Institute of Technology,Infocomm Technology Cluster","Infocomm Technology Cluster, Singapore Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Singapore Institute of Technology,Infocomm Technology Cluster","institution_ids":["https://openalex.org/I168639165"]},{"raw_affiliation_string":"Infocomm Technology Cluster, Singapore Institute of Technology","institution_ids":["https://openalex.org/I168639165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114061416","display_name":"Yi Lin Lau","orcid":null},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Yi Lin Lau","raw_affiliation_strings":["Singapore Institute of Technology,Infocomm Technology Cluster","Infocomm Technology Cluster, Singapore Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Singapore Institute of Technology,Infocomm Technology Cluster","institution_ids":["https://openalex.org/I168639165"]},{"raw_affiliation_string":"Infocomm Technology Cluster, Singapore Institute of Technology","institution_ids":["https://openalex.org/I168639165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112945976","display_name":"Leshawn Khin Ming Chan","orcid":null},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Leshawn Khin Ming Chan","raw_affiliation_strings":["Singapore Institute of Technology,Infocomm Technology Cluster","Infocomm Technology Cluster, Singapore Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Singapore Institute of Technology,Infocomm Technology Cluster","institution_ids":["https://openalex.org/I168639165"]},{"raw_affiliation_string":"Infocomm Technology Cluster, Singapore Institute of Technology","institution_ids":["https://openalex.org/I168639165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092266681","display_name":"Jia Ming Tristan Paul Goo","orcid":null},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jia Ming Tristan Paul Goo","raw_affiliation_strings":["Singapore Institute of Technology,Infocomm Technology Cluster","Infocomm Technology Cluster, Singapore Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Singapore Institute of Technology,Infocomm Technology Cluster","institution_ids":["https://openalex.org/I168639165"]},{"raw_affiliation_string":"Infocomm Technology Cluster, Singapore Institute of Technology","institution_ids":["https://openalex.org/I168639165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104135015","display_name":"Huahua Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huahua Zhang","raw_affiliation_strings":["Singapore Institute of Technology,Infocomm Technology Cluster","Infocomm Technology Cluster, Singapore Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Singapore Institute of Technology,Infocomm Technology Cluster","institution_ids":["https://openalex.org/I168639165"]},{"raw_affiliation_string":"Infocomm Technology Cluster, Singapore Institute of Technology","institution_ids":["https://openalex.org/I168639165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014625391","display_name":"Zhiyuan Zhang","orcid":"https://orcid.org/0000-0003-3945-5638"},"institutions":[{"id":"https://openalex.org/I109935558","display_name":"Ningbo University","ror":"https://ror.org/03et85d35","country_code":"CN","type":"education","lineage":["https://openalex.org/I109935558"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]},{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["CN","SG"],"is_corresponding":false,"raw_author_name":"Zhiyuan Zhang","raw_affiliation_strings":["Zhejiang University,Ningbo Innovation Center","Ningbo Innovation Center, Zhejiang University","School of Computing and Information Systems, Singapore Management University","NingboTech University"],"affiliations":[{"raw_affiliation_string":"Zhejiang University,Ningbo Innovation Center","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"Ningbo Innovation Center, Zhejiang University","institution_ids":["https://openalex.org/I109935558","https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University","institution_ids":["https://openalex.org/I79891267"]},{"raw_affiliation_string":"NingboTech University","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071022377","display_name":"Huaqun Guo","orcid":"https://orcid.org/0000-0001-6753-6537"},"institutions":[{"id":"https://openalex.org/I168639165","display_name":"Singapore Institute of Technology","ror":"https://ror.org/01v2c2791","country_code":"SG","type":"education","lineage":["https://openalex.org/I168639165"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huaqun Guo","raw_affiliation_strings":["Singapore Institute of Technology,Infocomm Technology Cluster","Infocomm Technology Cluster, Singapore Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Singapore Institute of Technology,Infocomm Technology Cluster","institution_ids":["https://openalex.org/I168639165"]},{"raw_affiliation_string":"Infocomm Technology Cluster, Singapore Institute of Technology","institution_ids":["https://openalex.org/I168639165"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I168639165"],"apc_list":null,"apc_paid":null,"fwci":1.5601,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.83672334,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"738","last_page":"743"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.7285953760147095},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7245525121688843},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6492794156074524},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5302025079727173},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.46014344692230225},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.4206690788269043},{"id":"https://openalex.org/keywords/security-bug","display_name":"Security bug","score":0.4167414903640747},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.3527509570121765},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.2865847647190094},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.19731828570365906},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.08024615049362183}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.7285953760147095},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7245525121688843},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6492794156074524},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5302025079727173},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.46014344692230225},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.4206690788269043},{"id":"https://openalex.org/C131275738","wikidata":"https://www.wikidata.org/wiki/Q7445023","display_name":"Security bug","level":5,"score":0.4167414903640747},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.3527509570121765},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.2865847647190094},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.19731828570365906},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.08024615049362183},{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.0},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icccs57501.2023.10150856","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccs57501.2023.10150856","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 8th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},{"id":"pmh:oai:figshare.com:article/24202008","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/CVE_Records_of_Known_Exploited_Vulnerabilities/24202008","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/24202008","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/CVE_Records_of_Known_Exploited_Vulnerabilities/24202008","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2004228899","https://openalex.org/W2077937403","https://openalex.org/W2537140541","https://openalex.org/W2765942900","https://openalex.org/W2769020070","https://openalex.org/W2895536778","https://openalex.org/W2953017892","https://openalex.org/W3015915248","https://openalex.org/W3156480510","https://openalex.org/W3160439561","https://openalex.org/W3175641979","https://openalex.org/W3183410303","https://openalex.org/W3185585282","https://openalex.org/W3205374593","https://openalex.org/W4294352778"],"related_works":["https://openalex.org/W2392503306","https://openalex.org/W2560421591","https://openalex.org/W2796094063","https://openalex.org/W4384518368","https://openalex.org/W1978034799","https://openalex.org/W125279808","https://openalex.org/W2123075981","https://openalex.org/W2910203822","https://openalex.org/W4239788664","https://openalex.org/W2980033082"],"abstract_inverted_index":{"Understanding":[0],"vulnerability":[1],"trends":[2],"is":[3,15,157],"critical":[4],"to":[5,16,57,71,142,200],"the":[6,18,22,25,41,47,86,97,103,120,125,133,145,169,173,184,187,204],"risk":[7],"management":[8],"process.":[9],"The":[10],"goal":[11],"of":[12,40,93,106,135,147,151,206],"this":[13],"paper":[14],"raise":[17],"awareness":[19],"and":[20,28,52,65,85,90,122,166,178,180,193,202,211],"inform":[21],"users":[23,39,70,199],"about":[24],"Common":[26,112],"Vulnerabilities":[27,35],"Exposures":[29],"(CVE)":[30],"associated":[31,154],"with":[32,124,155,161,172,186],"Known":[33],"Exploited":[34],"that":[36,132],"might":[37],"affect":[38],"products":[42,123,185],"by":[43,191],"gathering":[44],"data":[45,94,212],"from":[46,55,140],"National":[48],"Vulnerability":[49,113],"Database":[50],"(NVD)":[51],"CVE":[53,66,75,79,107,152],"details":[54],"2017":[56],"Present.":[58],"We":[59,100],"built":[60],"a":[61],"system":[62,196],"using":[63,209],"Python":[64],"Analyzer,":[67],"which":[68],"allow":[69],"search":[72],"for":[73],"specific":[74],"records":[76,108,153],"based":[77,95],"on":[78,96],"ID,":[80],"vendors,":[81,121],"products,":[82],"published":[83],"date":[84,89],"last":[87],"updated":[88],"export":[91],"rows":[92],"filtered":[98],"keyword.":[99],"also":[101],"analyze":[102],"overall":[104],"frequency":[105,134],"each":[109],"year":[110],"regarding":[111],"Scoring":[114],"System":[115],"(CVSS)":[116],"base":[117],"metric":[118],"trends,":[119],"most":[126,174],"ransomware":[127,137,156,176,207],"vulnerabilities.":[128],"Our":[129,195],"findings":[130],"show":[131],"all":[136],"vulnerabilities":[138],"increased":[139],"2019":[141],"2021.":[143],"Also,":[144],"number":[146],"high":[148],"CVSS":[149,163],"score":[150],"higher":[158],"than":[159],"those":[160],"low":[162],"scores.":[164],"Apple":[165,192],"Microsoft":[167],"are":[168,183],"top":[170],"vendors":[171],"exploited":[175],"vulnerabilities,":[177],"IOS":[179],"Windows":[181],"10":[182],"highest":[188],"vulnerable":[189],"versions":[190],"Microsoft.":[194],"can":[197],"help":[198],"prevent":[201],"mitigate":[203],"impact":[205],"attacks":[208],"datasets":[210],"analysis.":[213]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
