Product Type
Condition
Binding
Collectible Attributes
Free Shipping
Seller Location
Seller Rating
Published by LAP LAMBERT Academic Publishing, 2013
ISBN 10: 3659492779ISBN 13: 9783659492778
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
Book
Condition: New.
Published by LAP Lambert Academic Publishing, 2013
ISBN 10: 3659492779ISBN 13: 9783659492778
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Book Print on Demand
Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book.
Published by LAP Lambert Academic Publishing 2013-12, 2013
ISBN 10: 3659492779ISBN 13: 9783659492778
Seller: Chiron Media, Wallingford, United Kingdom
Book
PF. Condition: New.
Published by LAP LAMBERT Academic Publishing, 2013
ISBN 10: 3659492779ISBN 13: 9783659492778
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
Book Print on Demand
PAP. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by LAP LAMBERT Academic Publishing Dez 2013, 2013
ISBN 10: 3659492779ISBN 13: 9783659492778
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Book Print on Demand
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering. 92 pp. Englisch.
Published by LAP LAMBERT Academic Publishing, 2013
ISBN 10: 3659492779ISBN 13: 9783659492778
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
Book Print on Demand
PAP. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Published by LAP LAMBERT Academic Publishing, 2013
ISBN 10: 3659492779ISBN 13: 9783659492778
Seller: AHA-BUCH GmbH, Einbeck, Germany
Book Print on Demand
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering.
Published by LAP LAMBERT Academic Publishing, 2013
ISBN 10: 3659492779ISBN 13: 9783659492778
Seller: moluna, Greven, Germany
Book Print on Demand
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Khazaei Ghoujdi AtefehShe is a PhD candidate in Software Engineering at the Yazd University, Yazd, Iran. She has obtained her B.S. in Software Engineering from Emam Reza University, Mashhad, Iran and her M.S in Software Engineering f.