Skip to main content
. 2023 Feb 6;23(4):1802. doi: 10.3390/s23041802
AV Access Vector or Attack Vector
AC Access Complexity or Attack Complexity
AU Authentication
BS Base Score
BYOD Bring Your Own Device
CIA Confidentiality, Integrity, and Accessibility
CIS Center for Internet Security
CVSS Common Vulnerability Scoring System
DDoS Distributed Denial of Service
EMM Enterprise Mobile Management
ES Environmental Score
GRBF Gaussian Radial Basis Function
ICT Information and Communications Technology
ISS Impact Sub-Score
kNN k-Nearest Neighbours
KSVM Kernel Support Vector Machine
MCR Misclassification Rate
MDM Mobile Device Management
ML Machine Learning
NB Naive Bayes
NTP Natural Language Processing
NLTK Natural Language Toolkit
NVD National Vulnerabilities Database
OvO One-vs.-One
PCA Principal Component Analysis
PNN Probabilistic Neural Network
PR Privileges Required
QSRS Qualitative Severity Rating Scale
S Scope
SIMCA Soft Independent Modelling of Class Analogies
SMO Sequential Minimal Optimisation
TD Target Distribution
TS Time Score
UEM Unified Endpoint Management
UI User Interaction
VMC Vulnerability Management Center