Expertise

  • Computer Science

    • Encryption Scheme
    • Encryption
    • Access Control
    • Plaintext
    • Application
    • Testing
    • Vectors
    • proxy re encryption

Organisations

Ancillary activities

  • AIC4NLChairman Board AIC4NL

Publications

2025

ThreatCompass: A Tool For Identifying and Mapping Security Issues to TTPs (2025)In 2nd ACM Workshop on Large AI Systems and Models with Privacy and Security Analysis (pp. 58-67). Krijnen, Y., Simonetto, S., Oostveen, R., Bosch, P. & Jonker, W.https://doi.org/10.1145/3733800.3763265Beyond CVEs: Mapping Weaknesses in Unstructured Threat Intelligence Text (2025)[Working paper › Preprint]. Simonetto, S., Oostveen, R., van Ede, T. S., Bosch, P. & Jonker, W.Knowing your weaknesses is your greatest strength: Mapping CVE to CWE by leveraging CWE Hierarchy and LLMs (2025)[Working paper › Preprint]. Simonetto, S., Oostveen, R., van Ede, T. S., Bosch, P. & Jonker, W.What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs (2025)[Working paper › Preprint]. Simonetto, S., Oostveen, R., van Ede, T. S., Bosch, P. & Jonker, W.

2024

Text2Weak: mapping CVEs to CWEs using description embeddings analysis (2024)In The 4th Workshop on Artificial Intelligence-Enabled Cybersecurity Analytics. Simonetto, S., van Ede, T. S., Bosch, P., Jonker, W. & Oostveen, R.https://ai4cyber-kdd.com/KDD-AISec_files/Submission_8_final.pdf

Research profiles

Address

University of Twente

Zilverling (building no. 11), room 2007
Hallenweg 19
7522 NH Enschede
Netherlands

Navigate to location

Organisations

Scan the QR code or
Download vCard