Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World, Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12, pp.833-844, 2012. ,
, Common Vulnerabilities and Exposures (CVE
, Security Content Automation Protocol
,
, Common Vulnerability Scoring System
,
Large-scale Vulnerability Analysis, Proceedings of the 2006 SIGCOMM Workshop on Largescale Attack Defense, ser. LSAD '06, pp.131-138, 2006. ,
Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-day Vulnerabilities, Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC '10, pp.251-260, 2010. ,
Mesurer et prévenir l'évolution de la menace dans un cloud d'infrastructure, ComPas'18 -Conférence d'informatique en Parallélisme, pp.1-7, 2018. ,
A Vulnerability's Lifetime: Enhancing Version Information in CVE Databases, Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, ser. i-KNOW '15, vol.28, p.4, 2015. ,
The Myth of Software and Hardware Vulnerability Management, 2016. ,
Software Vulnerability Analysis Using CPE and CVE, CoRR, 2017. ,
A statistical interpretation of term specificity and its application in retrieval, Journal of Documentation, vol.28, pp.11-21, 1972. ,
,