The online version of the updated chapter can be found under DOI 10.1007/978-3-319-27179-8_13
You have full access to this open access chapter, Download conference paper PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Erratum to: Chapter 13: I. Bica et al. (Eds.) Innovative Security Solutions for Information Technology and Communications, DOI: 10.1007/978-3-319-27179-8_13
In the original version of the paper Up-High to Down-Low: Applying Machine Learning to an Exploit Database starting on page 184 of this volume the name of the second author is incorrect.
It should read Noam Gross - and not Noam Cohen.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Mirsky, Y., Gross, N., Shabtai, A. (2016). Erratum to: Up-High to Down-Low: Applying Machine Learning to an Exploit Database. In: Bica, I., Naccache, D., Simion, E. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2015. Lecture Notes in Computer Science(), vol 9522. Springer, Cham. https://doi.org/10.1007/978-3-319-27179-8_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-27179-8_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27178-1
Online ISBN: 978-3-319-27179-8
eBook Packages: Computer ScienceComputer Science (R0)