821 followers
I can't access the paper yet, but this early release from @INFORMS Journal on Computing sounds interesting. Curious whether: - They could apply the same technique to security vulnerabilities. - This sort of thing could be added into dev workflows. https