Predicting known Vulnerabilities from Attack News: A Transformer-Based Approach
arXiv:2602.19606v1 Announce Type: new Abstract: Identifying the vulnerabilities exploited during cyberattacks is essential for enabling timely responses and effective mitigation in software security. This paper...