Cloud Computing
Su Zhang 1. Quick Review. Data Source – NVD. Six Most Popular/Vulnerable Vendors For Our Experiments. Why The Six Vendors Are Chosen. Data Preprocessing.
L inking biodiversity data with the B iological Collections Ontology
Predicting zero-day software vulnerabilities through data mining --Second Presentation