Cited By
View all- Shi ZMatyunin NGraffi KStarobinski D(2024)Uncovering CWE-CVE-CPE Relations with Threat Knowledge GraphsACM Transactions on Privacy and Security10.1145/364181927:1(1-26)Online publication date: 5-Feb-2024
- Wu XWeng SZheng BZheng WChen XSun X(2024)NG_MDERANK: A software vulnerability feature knowledge extraction method based on N‐gram similarityJournal of Software: Evolution and Process10.1002/smr.2727Online publication date: 27-Aug-2024
- Cheng JTan XWang HWang JJiang XJin Z(2023)Network Vulnerability Assessment based on Knowledge Graph2023 9th International Conference on Big Data Computing and Communications (BigCom)10.1109/BIGCOM61073.2023.00015(48-55)Online publication date: 4-Aug-2023
- Show More Cited By