Return to Article Details Constructing a model for the dynamic evaluation of vulnerability in software based on public sources Download Download PDF