Author of the publication

An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities.

, , and . DEXA (1), volume 6860 of Lecture Notes in Computer Science, page 217-231. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence maximization in multilayer networks based on adaptive coupling degree., , , and . CoRR, (2023)Rotation invariant texture classification using adaptive LBP with directional statistical features., , , and . ICIP, page 285-288. IEEE, (2010)A multiscale edge detection algorithm based on wavelet domain vector hidden Markov tree model., , , and . Pattern Recognit., 37 (7): 1315-1324 (2004)GANs with Multiple Constraints for Image Translation., , , , , and . Complex., (2018)Information recovery via block compressed sensing in wireless sensor networks., , , , , and . ICC, page 1-6. IEEE, (2016)Apply SOA Paradigms in Cyber-Physical System to Enhance Interoperability: State-of-the-Art Review.. CoRR, (2019)Performance of ML Range Estimator in Radio Interferometric Positioning Systems., , , and . CoRR, (2014)Characterizing Pavement Surface Distress Conditions with Hyper-Spatial Resolution Natural Color Aerial Photography., , , and . Remote Sensing, 8 (5): 392 (2016)New Spectral Fitting Method for Full-Spectrum Solar-Induced Chlorophyll Fluorescence Retrieval Based on Principal Components Analysis., , , and . Remote Sensing, 7 (8): 10626-10645 (2015)Predicting Cyber Risks through National Vulnerability Database., , and . Inf. Secur. J. A Glob. Perspect., 24 (4-6): 194-206 (2015)