Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database.
Sanaz RahimiMehdi R. ZarghamPublished in: IEEE Trans. Reliab. (2013)
Keyphrases
- database
- risk assessment
- detection method
- experimental evaluation
- computational cost
- synthetic data
- cost function
- detection algorithm
- prior knowledge
- clustering method
- support vector machine
- prediction algorithm
- prediction model
- prediction accuracy
- computer systems
- image quality
- medical images
- image registration
- dynamic programming
- significant improvement
- artificial neural networks
- preprocessing
- computational complexity
- feature extraction
- image sequences