Modeling the Vulnerability Discovery Process Afewmodelsforthevulnerabilitydiscoveryprocesshavejustbeenpublishedrecently.Suchmodelswillalloweffectiveresourceallocationforpatchdevelopmentandarealso