Return to Article Details Early-Stage Identification of Exploit-Prone Vulnerabilities Using Parameterized Machine Learning Models Download Download PDF