September 22, 2016
Author(s)
David W. Flater
Counting known vulnerabilities and correlating different factors with the vulnerability track records of software products after the fact is obviously feasible. The harder challenge is to produce evidence to tell how vulnerable a piece of software is