ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2102.07869
  4. Cited By
Technical Report -- Expected Exploitability: Predicting the Development
  of Functional Vulnerability Exploits
v1v2 (latest)

Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits

15 February 2021
Octavian Suciu
Connor Nelson
Zhuo Lyu
Tiffany Bao
Tudor Dumitras
ArXiv (abs)PDFHTML

Papers citing "Technical Report -- Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits"

10 / 10 papers shown
Title
Exploit Prediction Scoring System (EPSS)
Exploit Prediction Scoring System (EPSS)
Jay Jacobs
Sasha Romanosky
Benjamin Edwards
M. Roytman
Idris Adjerid
42
76
0
13 Aug 2019
Adversarial Attacks and Defences: A Survey
Adversarial Attacks and Defences: A Survey
Anirban Chakraborty
Manaar Alam
Vishal Dey
Anupam Chattopadhyay
Debdeep Mukhopadhyay
AAMLOOD
80
681
0
28 Sep 2018
TESSERACT: Eliminating Experimental Bias in Malware Classification
  across Space and Time
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time
Feargus Pendlebury
Fabio Pierazzi
Roberto Jordaney
Johannes Kinder
Lorenzo Cavallaro
54
359
0
20 Jul 2018
Explaining Black-box Android Malware Detection
Explaining Black-box Android Malware Detection
Marco Melis
Davide Maiorca
Battista Biggio
Giorgio Giacinto
Fabio Roli
AAMLFAtt
39
43
0
09 Mar 2018
Economic Factors of Vulnerability Trade and Exploitation
Economic Factors of Vulnerability Trade and Exploitation
Luca Allodi
48
76
0
16 Aug 2017
Revisiting Classifier Two-Sample Tests
Revisiting Classifier Two-Sample Tests
David Lopez-Paz
Maxime Oquab
158
405
0
20 Oct 2016
Making Deep Neural Networks Robust to Label Noise: a Loss Correction
  Approach
Making Deep Neural Networks Robust to Label Noise: a Loss Correction Approach
Giorgio Patrini
A. Rozza
A. Menon
Richard Nock
Zhuang Li
NoLa
110
1,458
0
13 Sep 2016
Learning from Binary Labels with Instance-Dependent Corruption
Learning from Binary Labels with Instance-Dependent Corruption
A. Menon
Brendan van Rooyen
Nagarajan Natarajan
NoLa
105
41
0
03 May 2016
Distributed Representations of Sentences and Documents
Distributed Representations of Sentences and Documents
Quoc V. Le
Tomas Mikolov
FaML
259
9,246
0
16 May 2014
My Software has a Vulnerability, should I worry?
My Software has a Vulnerability, should I worry?
Luca Allodi
Fabio Massacci
44
170
0
07 Jan 2013
1