Author:
Yuan Hui,Xu Jie,Dong Liang,Zheng Lei,Yang Shan,Jin Bo,Liao RongTao,Zha ZhiYong,Meng HaoHua,Deng GuoRu,Zhuang Yan,Qiu Shuang,Xu Ning
Publisher
Springer International Publishing
Reference10 articles.
1. Periyasamy, K., Arirangan, S.: Prediction of future vulnerability discovery in software applications using vulnerability syntax tree (PFVD-VST). Int. Arab J. Inf. Technol. 16(2), 288–294 (2019)
2. Zonouz, S.A., Berthier, R., Khurana, H., et al.: Seclius: an information flow-based, consequence-centric security metric. IEEE Trans. Parallel Distrib. Syst. 26(2), 562–573 (2015)
3. Joh, H.C., Malaiya, Y.K.: Modeling skewness in vulnerability discovery. Qual. Reliab. Eng. Int. 30(8), 1445–1459 (2015)
4. Narang, S., Kapurt, P.K., Damodaran, D., et al.: Bi-criterion problem to determine optimal vulnerability discovery and patching time. Int. J. Reliab. Qual. Safety Eng. 25(1), 1850002:1–1850002:16 (2018)
5. Young, J.H., Michael, P., Hyun, S.K., et al.: Computational discovery of pathway-level genetic vulnerabilities in non-small-cell lung cancer. Bioinformatics 9, 1373–1379 (2016)