Better Not to Use Vulnerability’s Reference for Exploitability Prediction
About half of all exploit codes will become available within about two weeks of the release date of its vulnerability. However, 80% of the released vulnerabilities are never exploited. Since putting the same effort to eliminate all vulnerabilities can be somewhat wasteful, software companies usually...
Main Authors: | Heedong Yang, Seungsoo Park, Kangbin Yim, Manhee Lee |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-04-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/10/7/2555 |
Similar Items
-
Development of a Diagnostic Biosensor Method of Hypersensitivity Pneumonitis towards a Point-of-Care Biosensor
by: Tatiana Fiordelisio, et al.
Published: (2021-06-01) -
Experimentation and Assessment of Pseudonym Certificate Management and Misbehavior Detection in C-ITS
by: Farah Haidar, et al.
Published: (2021-01-01) -
Rapid Detection of Botulinum Neurotoxins—A Review
by: Robert J. Hobbs, et al.
Published: (2019-07-01) -
Dealing with Frustration: A Grounded Theory Study of CVE Practitioners
by: Orla Lehane
Published: (2019-03-01) -
Moving Towards a Single Smart Cadastral Platform in Victoria, Australia
by: Hamed Olfat, et al.
Published: (2020-05-01)