Survey of software vulnerability taxonomies
From MaRDI portal
Publication:3406969
Recommendations
Cited in
(6)- Neural software vulnerability analysis using rich intermediate graph representations of programs
- scientific article; zbMATH DE number 2013393 (Why is no real title available?)
- Prioritising vulnerabilities using ANP and evaluating their optimal discovery and patch release time
- Applied Cryptography and Network Security
- A taxonomy for identifying requirement interactions in software systems
- scientific article; zbMATH DE number 1905095 (Why is no real title available?)
This page was built for publication: Survey of software vulnerability taxonomies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3406969)