{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:49:14Z","timestamp":1766594954193,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733817.3762699","type":"proceedings-article","created":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:47:28Z","timestamp":1766594848000},"page":"20-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Knowledge-Driven Large Language Models for Automating CVSS Score Prediction"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0744-5876","authenticated-orcid":false,"given":"Seyedeh Leili","family":"Mirtaheri","sequence":"first","affiliation":[{"name":"University of Calabria, Rende, CS, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4101-2218","authenticated-orcid":false,"given":"AmirHossein","family":"Majd","sequence":"additional","affiliation":[{"name":"University of Calabria, Rende, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2313-6002","authenticated-orcid":false,"given":"Reza","family":"Shahbazian","sequence":"additional","affiliation":[{"name":"University of Palermo, Palermo, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4385-958X","authenticated-orcid":false,"given":"Andrea","family":"Pugliese","sequence":"additional","affiliation":[{"name":"University of Calabria, Rende, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,12,24]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICTON59386.2023.10207394"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Alicia Biju Vishnupriya Ramesh and Vijay\u00a0K Madisetti. 2024. Security vulnerability analyses of large language models (llms) through extension of the common vulnerability scoring system (cvss) framework. Journal of Software Engineering and Applications 17 5 (2024) 340\u2013358.","DOI":"10.4236\/jsea.2024.175019"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Joana\u00a0Cabral Costa Tiago Roxo Jo\u00e3o\u00a0BF Sequeiros Hugo Proenca and Pedro\u00a0RM Inacio. 2022. Predicting CVSS metric via description interpretation. IEEE Access 10 (2022) 59125\u201359134.","DOI":"10.1109\/ACCESS.2022.3179692"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3697090.3697109"},{"key":"e_1_3_3_2_6_2","unstructured":"Xueying Du Geng Zheng Kaixin Wang Jiayi Feng Wentai Deng Mingwei Liu Bihuan Chen Xin Peng Tao Ma and Yiling Lou. 2024. Vul-rag: Enhancing llm-based vulnerability detection via knowledge-level rag. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2406.11147 (2024)."},{"key":"e_1_3_3_2_7_2","unstructured":"BE FIRST. 2015. Common Vulnerability Scoring System v3. 1: Specification Document."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Sergio Flesca Domenico Mandaglio Francesco Scala and Andrea Tagarelli. 2024. A meta-active learning approach exploiting instance importance. Expert Systems with Applications 247 (2024) 123320. 10.1016\/j.eswa.2024.123320","DOI":"10.1016\/j.eswa.2024.123320"},{"key":"e_1_3_3_2_9_2","unstructured":"Dimcho Georgiev. 2024. Modern Vulnerability Management apart from CVSS. Master\u2019s thesis. University of Applied Sciences Technikum Wien Wien Austria. Thesis submitted in fulfillment of the requirements for the degree of Master of Science in Engineering in IT-Security. Supervisors: Stefan Schubert BSc. MSc. and Mag. David Warren. Student Number: 2210303040."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Nourhan Ibrahim Samar Aboulela Ahmed Ibrahim and Rasha Kashef. 2024. A survey on augmenting knowledge graphs (KGs) with large language models (LLMs): models evaluation metrics benchmarks and challenges. Discover Artificial Intelligence 4 1 (2024) 76.","DOI":"10.1007\/s44163-024-00175-8"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403190"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86520-7_31"},{"key":"e_1_3_3_2_13_2","unstructured":"Francesco Marchiori Denis Donadel and Mauro Conti. 2025. Can LLMs Classify CVEs? Investigating LLMs Capabilities in Computing CVSS Vectors. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2504.10713 (2025)."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Ali Mirarab Seyedeh\u00a0Leili Mirtaheri and Seyed\u00a0Amir Asghari. 2019. Value creation with big data analytics for enterprises: a survey. TELKOMNIKA (Telecommunication Computing Electronics and Control) 17 6 (2019) 2790\u20132802.","DOI":"10.12928\/telkomnika.v17i6.11962"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/DASC64200.2024.00014"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Seyedeh\u00a0Leili Mirtaheri Andrea Pugliese Narges Movahed and Reza Shahbazian. 2025. A comparative analysis on using GPT and BERT for automated vulnerability scoring. Intelligent Systems with Applications 26 (2025) 200515.","DOI":"10.1016\/j.iswa.2025.200515"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/IST64061.2024.10843410"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Abhishek Sharma Sangeeta Sabharwal and Sushama Nagpal. 2023. A hybrid scoring system for prioritization of software vulnerabilities. Computers & Security 129 (2023) 103256.","DOI":"10.1016\/j.cose.2023.103256"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Leslie\u00a0F Sikos. 2023. Cybersecurity knowledge graphs. Knowledge and Information Systems 65 9 (2023) 3511\u20133531.","DOI":"10.1007\/s10115-023-01860-3"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Romilla Syed. 2020. Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system. Information & Management 57 6 (2020) 103334.","DOI":"10.1016\/j.im.2020.103334"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/RWS58133.2023.10284627"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558646"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Yifan Yao Jinhao Duan Kaidi Xu Yuanfang Cai Zhibo Sun and Yue Zhang. 2024. A survey on large language model (llm) security and privacy: The good the bad and the ugly. High-Confidence Computing 4 2 (2024) 100211.","DOI":"10.1016\/j.hcc.2024.100211"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645646"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Jie Zhang Haoyu Bu Hui Wen Yongji Liu Haiqiang Fei Rongrong Xi Lun Li Yun Yang Hongsong Zhu and Dan Meng. 2025. When llms meet cybersecurity: A systematic literature review. Cybersecurity 8 1 (2025) 55.","DOI":"10.1186\/s42400-025-00361-w"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom59040.2023.00039"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"Ziyao Zhang Chong Wang Yanlin Wang Ensheng Shi Yuchi Ma Wanjun Zhong Jiachi Chen Mingzhi Mao and Zibin Zheng. 2025. Llm hallucinations in practical code generation: Phenomena mechanism and mitigation. Proceedings of the ACM on Software Engineering 2 ISSTA (2025) 481\u2013503.","DOI":"10.1145\/3728894"},{"key":"e_1_3_3_2_28_2","unstructured":"Xin Zhou Sicong Cao Xiaobing Sun and David Lo. 2024. Large language model for vulnerability detection and repair: literature review and the road ahead (2024). arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.02525 (2024)."}],"event":{"name":"CheckMATE '25: Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks","location":"Taipei Taiwan","acronym":"CheckMATE '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733817.3762699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T16:47:37Z","timestamp":1766594857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733817.3762699"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":27,"alternative-id":["10.1145\/3733817.3762699","10.1145\/3733817"],"URL":"https:\/\/doi.org\/10.1145\/3733817.3762699","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-12-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}