Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering.
"synopsis" may belong to another edition of this title.
She is a PhD candidate in Software Engineering at the Yazd University, Yazd, Iran. She has obtained her B.S. in Software Engineering from Emam Reza University, Mashhad, Iran and her M.S in Software Engineering from Shiraz University, Shiraz, Iran. Her research interests include Security and Natural Language Processing.
"About this title" may belong to another edition of this title.
£ 9.51 shipping from Germany to United Kingdom
Destination, rates & speedsSeller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering. 92 pp. Englisch. Seller Inventory # 9783659492778
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering. Seller Inventory # 9783659492778
Quantity: 1 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Khazaei Ghoujdi AtefehShe is a PhD candidate in Software Engineering at the Yazd University, Yazd, Iran. She has obtained her B.S. in Software Engineering from Emam Reza University, Mashhad, Iran and her M.S in Software Engineering f. Seller Inventory # 5159734
Quantity: Over 20 available
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering.Books on Demand GmbH, Überseering 33, 22297 Hamburg 92 pp. Englisch. Seller Inventory # 9783659492778
Quantity: 1 available