SY Huang, Y Wu - Proceedings of the 15th ACM Asia Conference on …, 2020 - dl.acm.org
Publicly available software vulnerabilities and exploit codes are often utilized by malicious
actors to launch cyberattack to vulnerable targets. Therefore, organizations not only need to …