default search action
"Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability ..."
Jiao Yin et al. (2023)
- Jiao Yin, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang, Mamoun Alazab:
Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery. IEEE Trans. Ind. Informatics 19(4): 5593-5601 (2023)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.