Up-High to Down-Low: Applying Machine Learning to an Exploit Database

Yisroel Mirsky, Noam Cohen, Asaf Shabtai. Up-High to Down-Low: Applying Machine Learning to an Exploit Database. In Ion Bica, David Naccache, Emil Simion, editors, Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers. Volume 9522 of Lecture Notes in Computer Science, pages 184-200, Springer, 2015. [doi]

@inproceedings{MirskyCS15,
  title = {Up-High to Down-Low: Applying Machine Learning to an Exploit Database},
  author = {Yisroel Mirsky and Noam Cohen and Asaf Shabtai},
  year = {2015},
  doi = {10.1007/978-3-319-27179-8_13},
  url = {http://dx.doi.org/10.1007/978-3-319-27179-8_13},
  researchr = {https://researchr.org/publication/MirskyCS15},
  cites = {0},
  citedby = {0},
  pages = {184-200},
  booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers},
  editor = {Ion Bica and David Naccache and Emil Simion},
  volume = {9522},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-27178-1},
}