Expertises
Computer Science
- Common Weakness Enumeration
- Cloud Application
- Container
- Kill Chain
- Large Language Model
- Open Source System
- Reasoning
- Vulnerabilities
Organisaties
Publicaties
2025
ThreatCompass: A Tool For Identifying and Mapping Security Issues to TTPs (2025)In 2nd ACM Workshop on Large AI Systems and Models with Privacy and Security Analysis (pp. 58-67). Krijnen, Y., Simonetto, S., Oostveen, R., Bosch, P. & Jonker, W.https://doi.org/10.1145/3733800.3763265Addressing Value Tensions in Collaborative Innovation: A Generative AI-Powered Serious Game (2025)[Contribution to conference › Paper] 85th Annual Meeting of the Academy of Management, AOM 2025. Vadacca, L., Simonetto, S., van den Berg, M. & Volker, L.Beyond CVEs: Mapping Weaknesses in Unstructured Threat Intelligence Text (2025)[Working paper › Preprint]. Simonetto, S., Oostveen, R., van Ede, T. S., Bosch, P. & Jonker, W.Knowing your weaknesses is your greatest strength: Mapping CVE to CWE by leveraging CWE Hierarchy and LLMs (2025)[Working paper › Preprint]. Simonetto, S., Oostveen, R., van Ede, T. S., Bosch, P. & Jonker, W.What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs (2025)[Working paper › Preprint]. Simonetto, S., Oostveen, R., van Ede, T. S., Bosch, P. & Jonker, W.
2024
5G security: Are we forgetting someone? (2024)[Contribution to conference › Poster] EEMCS networking day 2024 (Unpublished). Simonetto, S.Comprehensive threat analysis and systematic mapping of CVEs to MITRE framework (2024)In 1st International Conference on Natural Language Processing and Artificial Intelligence for Cyber Security. Simonetto, S. & Bosch, P.Strengthening Cloud Applications: A Deep Dive into Kill Chain Identification, Scoring, and Automatic Penetration Testing (2024)In Research Challenges in Information Science: 18th International Conference, RCIS 2024, Guimarães, Portugal, May 14–17, 2024, Proceedings, Part II (pp. 111-120). Springer. Simonetto, S.https://doi.org/10.1007/978-3-031-59468-7_13Quantifying Risk in the Kill-Chain: Automating Threat Prioritization for Kubernetes Clusters (2024)In CSNG2024: Cyber Security Next Generation Workshop 2024. Simonetto, S. & Bosch, P.Text2Weak: mapping CVEs to CWEs using description embeddings analysis (2024)In The 4th Workshop on Artificial Intelligence-Enabled Cybersecurity Analytics. Simonetto, S., van Ede, T. S., Bosch, P., Jonker, W. & Oostveen, R.https://ai4cyber-kdd.com/KDD-AISec_files/Submission_8_final.pdf
Onderzoeksprofielen
Vakken collegejaar 2024/2025
Vakken in het huidig collegejaar worden toegevoegd op het moment dat zij definitief zijn in het Osiris systeem. Daarom kan het zijn dat de lijst nog niet compleet is voor het gehele collegejaar.
Adres

Universiteit Twente
Zilverling (gebouwnr. 11), kamer 5032
Hallenweg 19
7522 NH Enschede
Universiteit Twente
Zilverling 5032
Postbus 217
7500 AE Enschede