SEARCH Articles Figures Tables Evolution of likelihood of vulnerability exploitation from disclosure time [Publishers Imprint]