Login / Signup
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Ying Dong
Wenbo Guo
Yueqi Chen
Xinyu Xing
Yuqing Zhang
Gang Wang
Published in:
USENIX Security Symposium (2019)
Keyphrases
</>
detection method
automatic detection
network security
security vulnerabilities
risk assessment
information assurance
malware detection
security issues
security policies
detection rate
information security
face detection
object detection
false alarms
security requirements
access control
data mining