Login / Signup
Localizing Vulnerabilities Statistically From One Exploit.
Shiqi Shen
Aashish Kolluri
Zhen Dong
Prateek Saxena
Abhik Roychoudhury
Published in:
AsiaCCS (2021)
Keyphrases
</>
information security
data sets
data mining
artificial intelligence
metadata
countermeasures