[1]
A. Anand, N. Bhatt, J. Kaur, and Y. Tamura, “Time Lag-Based Modelling for Software Vulnerability Exploitation Process”, JCSANDM, vol. 10, no. 4, pp. 663–678, Jun. 2021.