Return to Article Details An updated analysis of seasonal variations of the security vulnerability discovery process Download Download PDF