Skip to main content

Showing 1–4 of 4 results for author: Höst, M

.
  1. arXiv:2305.00382  [pdf, other

    cs.CR cs.AI cs.CL cs.SE

    Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database

    Authors: Anders Mølmen Høst, Pierre Lison, Leon Moonen

    Abstract: Knowledge graphs have shown promise for several cybersecurity tasks, such as vulnerability assessment and threat analysis. In this work, we present a new method for constructing a vulnerability knowledge graph from information in the National Vulnerability Database (NVD). Our approach combines named entity recognition (NER), relation extraction (RE), and entity prediction using a combination of ne… ▽ More

    Submitted 15 May, 2023; v1 submitted 30 April, 2023; originally announced May 2023.

    Comments: Accepted for publication in the 24th Nordic Conference on Computational Linguistics (NoDaLiDa), Tórshavn, Faroe Islands, May 22nd-24th, 2023. [v2]: added funding acknowledgments

  2. On infrastructure for facilitation of inner source in small development teams

    Authors: Johan Linåker, Maria Krantz, Martin Höst

    Abstract: The phenomenon of adopting open source software development practices in a corporate environment is known by many names, one being inner source. The objective of this study is to investigate how an organization consisting of small development teams can benefit from adopting inner source and assess the level of applicability. The research has been conducted as a case study at a software development… ▽ More

    Submitted 29 July, 2022; originally announced August 2022.

    Journal ref: 2014. In International Conference on Product-Focused Software Process Improvement (pp. 149-163). Springer, Cham

  3. arXiv:1906.04424  [pdf, other

    cs.SE

    Sharing of vulnerability information among companies -- a survey of Swedish companies

    Authors: Thomas Olsson, Martin Hell, Martin Höst, Ulrik Franke, Markus Borg

    Abstract: Software products are rarely developed from scratch and vulnerabilities in such products might reside in parts that are either open source software or provided by another organization. Hence, the total cybersecurity of a product often depends on cooperation, explicit or implicit, between several organizations. We study the attitudes and practices of companies in software ecosystems towards sharing… ▽ More

    Submitted 11 June, 2019; originally announced June 2019.

    Journal ref: Euromicro Conference on Software Engineering and Advanced Applications 2019

  4. How software engineering research aligns with design science: A review

    Authors: Emelie Engström, Margaret-Anne Storey, Per Runeson, Martin Höst, Maria Teresa Baldassarre

    Abstract: Background: Assessing and communicating software engineering research can be challenging. Design science is recognized as an appropriate research paradigm for applied research but is seldom referred to in software engineering. Applying the design science lens to software engineering research may improve the assessment and communication of research contributions. Aim: The aim of this study is 1) to… ▽ More

    Submitted 8 November, 2019; v1 submitted 29 April, 2019; originally announced April 2019.

    Comments: 32 pages, 10 figures

    Journal ref: Empirical Software Engineering, 25(4), 2630-2660(2020)