September 5, 2015Copyright © 2007 Tenable Network Security, Inc. 1 Good and Bad Uses Of Vulnerability Data For IDS Event Correlation Mostly Bad Uses Of.