"synopsis" may belong to another edition of this title.
"About this title" may belong to another edition of this title.
Shipping:
£ 3.20
Within U.S.A.
Book Description Condition: New. Seller Inventory # ABLIING23Mar3113020288758
Book Description PF. Condition: New. Seller Inventory # 6666-IUK-9783659492778
Book Description PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783659492778
Book Description Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering. 92 pp. Englisch. Seller Inventory # 9783659492778
Book Description PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L0-9783659492778
Book Description Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering. Seller Inventory # 9783659492778
Book Description Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Khazaei Ghoujdi AtefehShe is a PhD candidate in Software Engineering at the Yazd University, Yazd, Iran. She has obtained her B.S. in Software Engineering from Emam Reza University, Mashhad, Iran and her M.S in Software Engineering f. Seller Inventory # 5159734