Data-Flow Analysis Heuristic for Vulnerability Detection on Configurable Systems.
Gleyberson AndradeElder CiriloVinicius H. S. DurelliBruno B. P. CafeoEiji Adachi BarbosaPublished in: VEM (2020)
Keyphrases
- computer systems
- data sets
- flow analysis
- high quality
- data sources
- raw data
- data points
- data collection
- spatial data
- original data
- data analysis
- data structure
- detection algorithm
- high dimensional data
- detection rate
- data processing
- sensor data
- tabu search
- face detection
- input data
- object detection
- image data
- end users
- xml documents
- expert systems
- genetic algorithm