Sign in

Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching.

Jiamou SunZhenchang XingXiwei XuLiming ZhuQinghua Lu
Published in: ICSME (2022)
Keyphrases
  • matching algorithm
  • database
  • keypoints
  • buffer overflow
  • neural network
  • computer vision
  • feature points
  • image matching
  • life cycle
  • matching process
  • risk assessment
  • matching scheme
  • security vulnerabilities
  • attack graphs