Login / Signup
Supporting automated vulnerability analysis using formalized vulnerability signatures.
Mohamed Almorsy
John Grundy
Amani S. Ibrahim
Published in:
ASE (2012)
Keyphrases
</>
semi automated
fully automated
computer assisted
data sets
machine learning
multiresolution
data driven
risk assessment
automated analysis