Picture for Muhammed Fatih Bulut

Muhammed Fatih Bulut

SecEncoder: Logs are All You Need in Security

Add code
Nov 12, 2024
Viaarxiv icon

TIPS: Threat Actor Informed Prioritization of Applications using SecEncoder

Add code
Nov 12, 2024
Viaarxiv icon

Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption

Add code
Jun 27, 2023
Viaarxiv icon

Automated Compliance Blueprint Optimization with Artificial Intelligence

Add code
Jun 22, 2022
Figure 1 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 2 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 3 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Figure 4 for Automated Compliance Blueprint Optimization with Artificial Intelligence
Viaarxiv icon

Vulnerability Prioritization: An Offensive Security Approach

Add code
Jun 22, 2022
Figure 1 for Vulnerability Prioritization: An Offensive Security Approach
Figure 2 for Vulnerability Prioritization: An Offensive Security Approach
Figure 3 for Vulnerability Prioritization: An Offensive Security Approach
Figure 4 for Vulnerability Prioritization: An Offensive Security Approach
Viaarxiv icon

Attack Techniques and Threat Identification for Vulnerabilities

Add code
Jun 22, 2022
Figure 1 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 2 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 3 for Attack Techniques and Threat Identification for Vulnerabilities
Figure 4 for Attack Techniques and Threat Identification for Vulnerabilities
Viaarxiv icon