Mitigating Out-of-Vocabulary Challenges in Embedded devices Vulnerability Classification: An Ensemble Embedding Approach with Bidirectional Context Modeling
- Computer Science and Applications Laboratory, Faculty of Sciences, Moulay Ismail University of Meknes
B 11201 Zitoune, 50000, Meknes, Morocco
{ai,hi}@edu.umi.ac.ma, a.elbelrhitielalaoui@umi.ac.ma
Abstract
Critical infrastructure is increasingly reliant on embedded systems, which are particularly vulnerable to cyberattacks due to their inherent complexity and interconnectivity. Accurate classification of vulnerabilities in these systems is essential for targeted analysis and mitigation strategies. While pre-trained word embeddings such as Word2Vec, GloVe, and FastText are commonly used for this purpose, their effectiveness is limited by reliance on training corpora that lack domainspecific terminology, leading to challenges with Out-of-Vocabulary words and reduced classification performance. To address this limitation, we propose a novel ensemble embedding technique that combines multiple pre-trained embeddings to improve vulnerability classification in embedded systems. Evaluated on benchmark datasets, including the National Vulnerability Database and the China National Vulnerability Database, our method achieves a 91.50% F1-score on unseen data, outperforming traditional single-embedding approaches. This advancement demonstrates significant potential for enhancing cybersecurity in critical infrastructure applications.
Key words
ensemble embedding, word embedding, vulnerability classification, critical infrastructure devices security
Digital Object Identifier (DOI)
https://doi.org/10.2298/CSIS250314079B
Publication information
Volume 23, Issue 1 (January 2026)
Year of Publication: 2026
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium
Full text
Available in PDF
Portable Document Format
How to cite
Yahya, A. B., Akhal, H. E., Alaoui, A. E. B. E.: Mitigating Out-of-Vocabulary Challenges in Embedded devices Vulnerability Classification: An Ensemble Embedding Approach with Bidirectional Context Modeling. Computer Science and Information Systems, Vol. 23, No. 1, 397-417. (2026), https://doi.org/10.2298/CSIS250314079B
Journal's Facebook page