Game of detections: how are security vulnerabilities discovered in the wild?
Crossref DOI link: https://doi.org/10.1007/s10664-015-9403-7
Published Online: 2015-09-15
Published Print: 2016-10
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Hafiz, Munawar
Fang, Ming
Text and Data Mining valid from 2015-09-15