Login / Signup
You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Frank Li
Zakir Durumeric
Jakub Czyz
Mohammad Karami
Michael Bailey
Damon McCoy
Stefan Savage
Vern Paxson
Published in:
USENIX Security Symposium (2016)
Keyphrases
</>
information systems
data sets
databases
neural network
real world
social networks
database systems
back end
buffer overflow