共 146 条
[1]
Abadi M., P INT S FORM METH PA, P1
[2]
Adnan Rawashdeh., 2006, J COMPUTER SCI, V2, P373, DOI DOI 10.3844/JCSSP.2006.373.381
[7]
AlBreiki HH, 2014, IEEE INT CONF INNOV, P93, DOI 10.1109/INNOVATIONS.2014.6987569
[8]
Alebrahim A, 2014, LECT NOTES COMPUT SC, V8708, P45, DOI 10.1007/978-3-319-10975-6_4
[9]
Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS
[J].
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18),
2018,
:119-126