From post

How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes.

, , , , и . USENIX Security Symposium, стр. 359-376. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PNet: privacy-preserving personalization of AI-based models by anonymous inter-person similarity networks., , , , и . MobiQuitous, стр. 60-69. ACM, (2019)A Methodology for Model-Driven Development of Crisis Management Applications using Solverational., , и . GI Jahrestagung, том P-154 из LNI, стр. 1407-1419. GI, (2009)TrackItPipe: A Fabrication Pipeline To Incorporate Location and Rotation Tracking Into 3D Printed Objects., , , , , , и . UIST (Adjunct Volume), стр. 30:1-30:5. ACM, (2022)Immersive-Labeler: Immersive Annotation of Large-Scale 3D Point Clouds in Virtual Reality., , , , и . SIGGRAPH Posters, стр. 27:1-27:2. ACM, (2022)Tracking Criminal Events through IoT Devices and an Edge Computing Approach., , и . ICCCN, стр. 1-6. IEEE, (2019)On the Automated Assessment of Open-Source Cyber Threat Intelligence Sources., , и . ICCS (2), том 12138 из Lecture Notes in Computer Science, стр. 453-467. Springer, (2020)Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media., , , и . NCA, стр. 1-10. IEEE, (2018)Human Physical Status detection related to Danger Situations based on Smartwatch and Smartphone., , и . Networking, стр. 564-568. IEEE, (2020)IoT dataset generation framework for evaluating anomaly detection mechanisms., , , и . ARES, стр. 30:1-30:6. ACM, (2020)Understanding Stationary and Moving Direct Skin Vibrotactile Stimulation on the Palm., , , , , , , и . CoRR, (2023)