Login / Signup
A novel approach to evaluate software vulnerability prioritization.
Chien-Cheng Huang
Feng-Yu Lin
Frank Yeong-Sung Lin
Yeali S. Sun
Published in:
J. Syst. Softw. (2013)
Keyphrases
</>
software development
software tools
software design
security vulnerabilities
test cases
software application
data sets
software maintenance
search algorithm
user interface
software systems
embedded systems
regression testing
software packages
software testing
development process
source code
decision trees