Login / Signup
An Empirical Analysis of Exploitation Attempts Based on Vulnerabilities in Open Source Software.
Sam Ransbotham
Published in:
WEIS (2010)
Keyphrases
</>
open source software
open source
source code
software development
open source software development
open source projects
information security
mailing lists
security vulnerabilities
free software
databases
real world
machine learning
social networks
business models
attack graph