Yisroel Mirsky, Noam Cohen, Asaf Shabtai. Up-High to Down-Low: Applying Machine Learning to an Exploit Database. In Ion Bica, David Naccache, Emil Simion, editors, Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers. Volume 9522 of Lecture Notes in Computer Science, pages 184-200, Springer, 2015. [doi]
@inproceedings{MirskyCS15, title = {Up-High to Down-Low: Applying Machine Learning to an Exploit Database}, author = {Yisroel Mirsky and Noam Cohen and Asaf Shabtai}, year = {2015}, doi = {10.1007/978-3-319-27179-8_13}, url = {http://dx.doi.org/10.1007/978-3-319-27179-8_13}, researchr = {https://researchr.org/publication/MirskyCS15}, cites = {0}, citedby = {0}, pages = {184-200}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, editor = {Ion Bica and David Naccache and Emil Simion}, volume = {9522}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-319-27178-1}, }