Login / Signup
Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching.
Jiamou Sun
Zhenchang Xing
Xiwei Xu
Liming Zhu
Qinghua Lu
Published in:
ICSME (2022)
Keyphrases
</>
matching algorithm
database
keypoints
buffer overflow
neural network
computer vision
feature points
image matching
life cycle
matching process
risk assessment
matching scheme
security vulnerabilities
attack graphs