Return to Article Details Vulnerability Identification on GNU/Linux Operating Systems through Case-Based Reasoning Download Download PDF