Login / Signup

Localizing Vulnerabilities Statistically From One Exploit.

Shiqi ShenAashish KolluriZhen DongPrateek SaxenaAbhik Roychoudhury
Published in: AsiaCCS (2021)
Keyphrases
  • information security
  • data sets
  • data mining
  • artificial intelligence
  • metadata
  • countermeasures