Login / Signup
The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting.
Andy Ozment
Published in:
WEIS (2005)
Keyphrases
</>
maximum likelihood
risk assessment
social interaction
databases
buffer overflow
utility function
attack graphs
database
individual level
social capital
privacy preserving
social media
evolutionary algorithm
website
machine learning
neural network
data sets