Afewmodelsforthevulnerabilitydiscoveryprocesshavejustbeenpublishedrecently.Suchmodelswillalloweffectiveresourceallocationforpatchdevelopmentandarealsoneededforevaluatingtheriskofvulnerabilityexploitation.