Cited By
View all- Le TChen HBabar M(2022)A Survey on Data-driven Software Vulnerability Assessment and PrioritizationACM Computing Surveys10.1145/352975755:5(1-39)Online publication date: 3-Dec-2022
- Rivera A. CShaghaghi ANguyen DKanhere S(2022)Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting MachinesMobile and Ubiquitous Systems: Computing, Networking and Services10.1007/978-3-030-94822-1_7(115-127)Online publication date: 8-Feb-2022
- Sun XLi LBo LWu XWei YLi B(2022)Automatic software vulnerability classification by extracting vulnerability triggersJournal of Software: Evolution and Process10.1002/smr.2508Online publication date: 8-Sep-2022
- Show More Cited By