L. Bilge and T. Dumitra?, Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World, Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12, pp.833-844, 2012.

, Common Vulnerabilities and Exposures (CVE

, Security Content Automation Protocol

. Nvd--cpe,

, Common Vulnerability Scoring System

N. Cve and . Relationship,

S. Frei, M. May, U. Fiedler, and B. Plattner, Large-scale Vulnerability Analysis, Proceedings of the 2006 SIGCOMM Workshop on Largescale Attack Defense, ser. LSAD '06, pp.131-138, 2006.

S. Clark, S. Frei, M. Blaze, and J. Smith, Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-day Vulnerabilities, Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC '10, pp.251-260, 2010.

C. Elbaz, L. Rilling, and C. Morin, Mesurer et prévenir l'évolution de la menace dans un cloud d'infrastructure, ComPas'18 -Conférence d'informatique en Parallélisme, pp.1-7, 2018.

L. Glanz, S. Schmidt, S. Wollny, and B. Hermann, A Vulnerability's Lifetime: Enhancing Version Information in CVE Databases, Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, ser. i-KNOW '15, vol.28, p.4, 2015.

A. Dulaunoy, The Myth of Software and Hardware Vulnerability Management, 2016.

L. A. Sanguino and R. Uetz, Software Vulnerability Analysis Using CPE and CVE, CoRR, 2017.

K. S. Jones, A statistical interpretation of term specificity and its application in retrieval, Journal of Documentation, vol.28, pp.11-21, 1972.

. Firres,