Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities | IEEE Journals & Magazine | IEEE Xplore