Proceedings of the 15th International Conference on Knowledge Technologies and Data-Driven Business 2015
DOI: 10.1145/2809563.2809612
|View full text |Cite
|
Sign up to set email alerts
|

A vulnerability's lifetime

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 4 publications
0
0
0
Order By: Relevance
“…On the limitations of vulnerability databases. As part of our systematic mapping, we could discover that only a limited set of studies employed vulnerability databases in the context of vulnerability detection (e.g., Zou et al, 2019), database comparison (e.g., Tripathi and Singh, 2011), and database quality improvement (e.g., Glanz et al, 2015). Instead, these studies preferred uncovering vulnerability data by mining other data sources (Lin et al, 2020).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…On the limitations of vulnerability databases. As part of our systematic mapping, we could discover that only a limited set of studies employed vulnerability databases in the context of vulnerability detection (e.g., Zou et al, 2019), database comparison (e.g., Tripathi and Singh, 2011), and database quality improvement (e.g., Glanz et al, 2015). Instead, these studies preferred uncovering vulnerability data by mining other data sources (Lin et al, 2020).…”
Section: Discussionmentioning
confidence: 99%
“…Five papers contribute to other purposes, including comparing the information contents of different vulnerability databases (Tripathi andSingh, 2011, Forain et al, 2022), multi-class vulnerability detection (Zou et al, 2019), and vulnerability information quality enhancement (Glanz et al, 2015;Takahashi and Inoue, 2016;Kuehn et al, 2021).…”
Section: Linaresmentioning
confidence: 99%