Author of the publication

To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit.

, , , and . CODASPY, page 97-104. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating CVSS Base Score Using Vulnerability Rewards Programs., , and . SEC, volume 471 of IFIP Advances in Information and Communication Technology, page 62-75. Springer, (2016)To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit., , , and . CODASPY, page 97-104. ACM, (2016)Empirical Characterization of the Likelihood of Vulnerability Discovery., , and . Int. J. Perform. Eng., 16 (7): 1008-1018 (2020)Case Study: Using Project Based Learning to Develop Parallel Programing and Soft Skills., , , and . IPDPS Workshops, page 304-311. IEEE, (2019)Mapping Zero-Click Attack Behavior into MITRE ATT&CK Mobile: A Systematic Process., , , and . CSCI, page 890-896. IEEE, (2022)A Threat Analysis Methodology for Security Requirements Elicitation in Machine Learning Based Systems., and . QRS Companion, page 426-433. IEEE, (2020)Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System., and . QRS, page 252-261. IEEE, (2015)Using Software Structure to Predict Vulnerability Exploitation Potential., and . SERE (Companion), page 13-18. IEEE, (2014)Analyzing Software Supply Chain Security Risks in Industrial Control System Protocols: An OpenSSF Scorecard Approach., , and . DSA, page 302-311. IEEE, (2023)Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability., , and . HASE, page 1-8. IEEE Computer Society, (2014)