Login / Signup
Time Lag-Based Modelling for Software Vulnerability Exploitation Process.
Adarsh Anand
Navneet Bhatt
Jasmine Kaur
Yoshinobu Tamura
Published in:
J. Cyber Secur. Mobil. (2021)
Keyphrases
</>
software design
data sets
machine learning
development process
software life cycle
neural network
real world
information retrieval
learning algorithm
metadata
open source
software development
intrusion detection
process control
hardware design