Login / Signup

Supporting automated vulnerability analysis using formalized vulnerability signatures.

Mohamed AlmorsyJohn GrundyAmani S. Ibrahim
Published in: ASE (2012)
Keyphrases
  • semi automated
  • fully automated
  • computer assisted
  • data sets
  • machine learning
  • multiresolution
  • data driven
  • risk assessment
  • automated analysis