Verlag: LAP LAMBERT Academic Publishing, 2013
ISBN 10: 3659492779 ISBN 13: 9783659492778
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 45,45
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Khazaei Ghoujdi AtefehShe is a PhD candidate in Software Engineering at the Yazd University, Yazd, Iran. She has obtained her B.S. in Software Engineering from Emam Reza University, Mashhad, Iran and her M.S in Software Engineering f.
Verlag: LAP LAMBERT Academic Publishing Dez 2013, 2013
ISBN 10: 3659492779 ISBN 13: 9783659492778
Sprache: Englisch
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
EUR 49,90
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering. 92 pp. Englisch.
Verlag: LAP LAMBERT Academic Publishing Dez 2013, 2013
ISBN 10: 3659492779 ISBN 13: 9783659492778
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 54,90
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering.Books on Demand GmbH, Überseering 33, 22297 Hamburg 92 pp. Englisch.
Verlag: LAP LAMBERT Academic Publishing, 2013
ISBN 10: 3659492779 ISBN 13: 9783659492778
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 54,90
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Software vulnerabilities can lead to monetary and information losses. Moreover, detecting vulnerability is very resource intensive. Due to limited human and financial resources, prioritization of vulnerabilities is a crucial task. Very little attention has been paid to textual information hidden in vulnerabilities databases like CVE and OSVDB. This research explores how to use from the information hidden in these texts to vulnerability prediction and clustering.