Are vulnerabilities discovered and resolved like other defects?
Patrick MorrisonRahul PanditaXusheng XiaoRam ChillaregeLaurie A. WilliamsPublished in: Empir. Softw. Eng. (2018)
Keyphrases
- information security
- genetic algorithm
- security vulnerabilities
- defect detection
- defect classification
- data sets
- security issues
- countermeasures
- evolutionary algorithm
- automated visual inspection
- security risks
- lightweight
- database
- search algorithm
- video sequences
- face recognition
- case study
- decision making
- machine learning
- real time