%PDF-1.5
%
1 0 obj
<>stream
application/pdfIEEEIEEE Transactions on Information Forensics and Security; ;PP;99;10.1109/TIFS.2019.2895963Software Vulnerability AnalysisVulnerability Discovery ModelSoftware SecurityMachine LearningLarge-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application SecurityMengyuan ZhangXavier de Carne de CarnavaletLingyu WangAhmed Ragab
IEEE Transactions on Information Forensics and Security199PP10.1109/TIFS.2019.28959631
endstream
endobj
2 0 obj
<>/Metadata 1 0 R/Pages 7 0 R>>
endobj
3 0 obj
<>
endobj
4 0 obj
<>
endobj
5 0 obj
<>stream
xS(T e
endstream
endobj
6 0 obj
<>stream
xST %
endstream
endobj
7 0 obj
<>
endobj
8 0 obj
<>
endobj
9 0 obj
<>
endobj
10 0 obj
<>
endobj
11 0 obj
<>
endobj
29 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[52 0 R 53 0 R 54 0 R 55 0 R 56 0 R 57 0 R 58 0 R 59 0 R 60 0 R 61 0 R 62 0 R 63 0 R 64 0 R 65 0 R]>>
endobj
30 0 obj
<>/ProcSet[/PDF/Text]/Font<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[68 0 R 69 0 R 70 0 R 71 0 R 72 0 R 73 0 R 74 0 R 75 0 R 76 0 R 77 0 R 78 0 R 79 0 R 80 0 R 81 0 R 82 0 R 83 0 R 84 0 R]>>
endobj
31 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[87 0 R 88 0 R 89 0 R]>>
endobj
32 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[94 0 R]>>
endobj
33 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[96 0 R 97 0 R]>>
endobj
34 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[99 0 R 100 0 R 101 0 R 102 0 R 103 0 R 104 0 R 105 0 R 106 0 R 107 0 R 108 0 R 109 0 R]>>
endobj
35 0 obj
<>/ProcSet[/PDF/Text]/Font<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[118 0 R 119 0 R 120 0 R 121 0 R 122 0 R 123 0 R 124 0 R]>>
endobj
36 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[129 0 R 130 0 R 131 0 R 132 0 R 133 0 R 134 0 R 135 0 R 136 0 R 137 0 R 138 0 R 139 0 R 140 0 R]>>
endobj
37 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[142 0 R 143 0 R 144 0 R 145 0 R 146 0 R 147 0 R 148 0 R 149 0 R 150 0 R 151 0 R 152 0 R 153 0 R 154 0 R 155 0 R 156 0 R 157 0 R 158 0 R 159 0 R 160 0 R 161 0 R 162 0 R 163 0 R]>>
endobj
38 0 obj
<>/ProcSet[/PDF/Text]/Font<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[172 0 R 173 0 R 174 0 R 175 0 R 176 0 R 177 0 R 178 0 R]>>
endobj
39 0 obj
<>/ProcSet[/PDF/Text]/Font<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[186 0 R 187 0 R 188 0 R 189 0 R 190 0 R 191 0 R 192 0 R 193 0 R 194 0 R 195 0 R 196 0 R]>>
endobj
40 0 obj
<>/ProcSet[/PDF/Text]/Font<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[206 0 R 207 0 R 208 0 R 209 0 R 210 0 R 211 0 R 212 0 R 213 0 R 214 0 R]>>
endobj
41 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[216 0 R 217 0 R 218 0 R 219 0 R 220 0 R]>>
endobj
42 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[223 0 R 224 0 R 225 0 R 226 0 R 227 0 R 228 0 R 229 0 R 230 0 R 231 0 R]>>
endobj
43 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[233 0 R 234 0 R 235 0 R 236 0 R 237 0 R 238 0 R 239 0 R 240 0 R 241 0 R 242 0 R 243 0 R 244 0 R 245 0 R 246 0 R 247 0 R 248 0 R]>>
endobj
44 0 obj
<>>>/MediaBox[0 0 612 792]/QInserted true/Annots[250 0 R 251 0 R 252 0 R 253 0 R]>>
endobj
12 0 obj
<>
endobj
13 0 obj
<>stream
xڕ[YƑ~ׯGv >hzC#y=Yj4Ql"4i7,$FUufefQtooܛq/zwynpxB'Mċ o_6n>.\%եW)6>Mu/w&t}ϛIf'N,uAmz,{[vpA$Umʾ)7}ui0uH}s>WdQ>;ϋ$h @`![)KiZ?w
Ѻa/16u7<.П/RuC:`]0|q
a~LSSJa.UQvGBLcےAF²L7,~mwSNK`d[Bl|䫬r`"mdgȊծش:@s:W"Ymmh&=9C nŌ
'h}nSG{D 1hny2߅oVHTSSzγ }+(Yړ_5RmH٭,nz+W`i%vx9`S+r\H<6WNDώ&H܍ZDTrp{pjd(mй:a LR83&M; xhe3t
z˓@AggP9K0pX!P*U6B+cصGįgz|?t Mmp۾ <#~_c(iHP
}T8H
í
uv=Re
zT&+d(n6\!-y=HS QXX`&E