Automatically Locating Mitigation Information for Security Vulnerabilities
暂无分享,去创建一个
[1] Guillermo L. Grinblat,et al. Toward Large-Scale Vulnerability Discovery using Machine Learning , 2016, CODASPY.
[2] GhaffarianSeyed Mohammad,et al. Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques , 2017 .
[3] Tudor Dumitras,et al. From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild , 2018, USENIX Security Symposium.
[4] Leyla Bilge,et al. The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching , 2015, 2015 IEEE Symposium on Security and Privacy.
[5] Ramayya Krishnan,et al. An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure , 2010, Inf. Syst. Res..
[6] Twittie Senivongse,et al. Security vulnerability assessment for software version upgrade , 2017, 2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[7] Wenhui Hu,et al. Improvement on OTP authentication and a possession-based authentication framework , 2018, Int. J. Multim. Intell. Secur..
[8] Qinghua Li,et al. A Machine Learning-based Approach for Automated Vulnerability Remediation Analysis , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).
[9] Fengli Zhang,et al. Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis , 2018 .
[10] Qinghua Li,et al. Dynamic Risk-Aware Patch Scheduling , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).