1 Introduction
Researchers have used data from various vulnerability databases to study trends of discovery of new vulnerabilities, used various models for fitting the vulnerability discovery process, and predicting the number of new vulnerabilities that may be discovered for a given product [1]–[6]. Estimating the number of new vulnerabilities over time is useful both for vendors of these products as well as the end-users as it can help them with resource allocation.