cff-version: 1.2.0 abstract: "

This repository contains the source code for our exploit prediction model, as well as detailed descriptions and links for each dataset used in this study:


1. Model source code: The R code used for predicting and explaining exploitation in IoT vulnerabilities is included. All necessary instructions for running the model are provided in the README file within the ZIP archive.


2. You can use the following sources to collect the data used in the model:

2.1. IoT Vulnerabilities:

2.1.1 VARIoT: https://www.variot.eu/


2.2. Targeted IoT Vulnerabilities:

2.2.1. VirusTotal: https://www.virustotal.com

2.2.2. CISA KEV: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

2.2.3. VulnCheck KEV: https://vulncheck.com/kev

2.2.4. AttackerKB: https://attackerkb.com

2.2.5. Google Project Zero: https://googleprojectzero.blogspot.com/

2.2.6. Honeypots such as IoTPOT and X-Pot: https://sec.ynu.codes/iot/


2.3. Vulnerability Features:

2.3.1. NVD: https://nvd.nist.gov/


2.4. Exploitability Features:

2.4.1. ExploitDB: https://www.exploit-db.com/


2.5. Hacking Community Features:

2.5.1 CrimeBB: https://www.cambridgecybercrime.uk/datasets.html


" authors: - family-names: Al Alsadi given-names: Arwa orcid: "https://orcid.org/0000-0002-5280-6853" title: "Data underlying the publication: “Bits and Pieces: Piecing Together Factors of IoT Vulnerability Exploitation"" keywords: version: 1 identifiers: - type: doi value: 10.4121/69d111e7-30e6-4206-b27d-22a5f4e33722.v1 license: CC BY 4.0 date-released: 2025-05-23