Privacy-enabled Recommendations for Software Vulnerabilities
New software vulnerabilities are published daily.Prioritizing vulnerabilities according to their relevance to the collection of software an organization uses is a costly and slow process.While recommender systems were earlier proposed to address this issue, they ignore the security of the vulnerability prioritization data.As a result, a malicious operator or a third party adversary can collect vul