Picture for Muhammed Fatih Bulut

Muhammed Fatih Bulut

TIPS: Threat Actor Informed Prioritization of Applications using SecEncoder

Add code
Nov 12, 2024
Viaarxiv icon

SecEncoder: Logs are All You Need in Security

Add code
Nov 12, 2024
Figure 1 for SecEncoder: Logs are All You Need in Security
Figure 2 for SecEncoder: Logs are All You Need in Security
Figure 3 for SecEncoder: Logs are All You Need in Security
Figure 4 for SecEncoder: Logs are All You Need in Security
Viaarxiv icon

Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption

Add code
Jun 27, 2023
Figure 1 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 2 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 3 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Figure 4 for Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption
Viaarxiv icon

Automated Compliance Blueprint Optimization with Artificial Intelligence

Add code
Jun 22, 2022
Figure 1 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 2 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 3 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 4 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Viaarxiv icon

Vulnerability Prioritization: An Offensive Security Approach

Add code
Jun 22, 2022
Figure 1 for Vulnerability Prioritization: An Offensive Security Approach
Figure 2 for Vulnerability Prioritization: An Offensive Security Approach
Figure 3 for Vulnerability Prioritization: An Offensive Security Approach
Figure 4 for Vulnerability Prioritization: An Offensive Security Approach
Viaarxiv icon

Attack Techniques and Threat Identification for Vulnerabilities

Add code
Jun 22, 2022
Figure 1 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 2 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 3 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 4 for Attack Techniques and Threat Identification for Vulnerabilities
Viaarxiv icon