Skip to content

Analysis & Visualizations

Overview

This section presents comprehensive analysis of vulnerability lifecycles, exploit patterns, and patch dynamics across multiple vendor ecosystems. The analysis combines reproduced findings from the original transfer report with expanded multi-vendor analysis using updated data through May 2025.

Analysis Framework

  • Transfer Report (2024)

    Original PhD transfer report with Microsoft-focused analysis and foundational methodology

  • Updated Analysis (2025)

    Enhanced analysis with multi-vendor data, extended timeframe, and advanced statistical methods

  • Interactive Dashboards

    Real-time Superset dashboards for exploratory analysis and visualization

  • Statistical Modeling

    Advanced statistical techniques including survival analysis and predictive modeling

Data Coverage Comparison

Aspect Transfer Report (2024) Updated Analysis (2025)
CVEs 200K+ 280K+
Exploits 45K+ 50K+
Patches 9K+ (Microsoft only) 40K+ (Multi-vendor)
Vendors 1 (Microsoft) 5+ (MS, RedHat, Cisco, GitHub, OSS)
Timeframe 1999-2024 1999-2025
Methods Descriptive statistics Advanced modeling + ML

Analysis Sections

📊 Transfer Report Foundation

🚀 Updated Multi-Vendor Analysis

Interactive Analytics Platform

Apache Superset Dashboard Access

🎯 Interactive Analytics Playground

Access real-time vulnerability analytics dashboards powered by Apache Superset.

Access Superset Playground

Platform: analytic.ifthreat.com
Access: Request required - Contact for credentials
Features: Interactive dashboards, real-time queries, custom visualizations

Dashboard Access

To request access to the interactive analytics platform:

  1. Email: Eid.Albedah@citystgeorges.ac.uk
  2. Subject: "Superset Access Request"
  3. Include: Your name, institution, and reason for access
  4. Response Time: 24-48 hours for credential provisioning

Available Dashboard Categories

  • CVE Distribution Overview: Annual trends, severity patterns, vendor breakdowns
  • Product & Vendor Analysis: Top vulnerable products and vendors with drill-down
  • CWE Pattern Explorer: Weakness type analysis and co-occurrence patterns
  • Geographic & Temporal Views: CVE patterns by region and time
  • Exploit Timeline Tracker: Real-time exploit publication monitoring
  • Vendor Exploitation Rates: Comparative exploitation analysis by vendor
  • Exploit-CVE Race Dynamics: Time-to-exploitation analysis
  • Verification Status Tracking: Verified vs unverified exploit patterns
  • Multi-Vendor Patch Response: Response time comparisons across vendors
  • Severity-Based Prioritization: Patch timing by vulnerability severity
  • Product Family Analysis: Patch patterns by product categories
  • Lifecycle Complete View: End-to-end vulnerability lifecycle tracking
  • Statistical Model Results: ML model performance and predictions
  • Comparative Ecosystem Analysis: Commercial vs open source patterns
  • Trend Forecasting: Predictive models for future vulnerability patterns
  • Research Validation: Cross-validation of research findings

This analysis section represents the most comprehensive empirical study of vulnerability lifecycles across commercial and open source ecosystems, providing unprecedented insights for academic research, industry practice, and policy development.