Sign in

Are vulnerabilities discovered and resolved like other defects?

Patrick J. MorrisonRahul PanditaXusheng XiaoRam ChillaregeLaurie A. Williams
Published in: ICSE (2018)
Keyphrases
  • defect detection
  • neural network
  • information systems
  • database
  • data sets
  • databases
  • real world
  • decision making
  • multiscale
  • countermeasures
  • security vulnerabilities
  • defect classification