Detecting Software Vulnerabilities Based on Hierarchical Graph Attention Network.
Wenlin XuTong LiJinsong WangTao FuYahui TangPublished in: CICAI (2) (2023)
Keyphrases
- attack graph
- attack graphs
- graphical representation
- peer to peer
- dynamic networks
- computer systems
- software development
- network configuration
- security risks
- fully connected
- graph representation
- spanning tree
- graph structure
- software systems
- network model
- network structure
- information security
- abstraction layer
- wireless sensor networks
- data flow
- graph theory
- graph theoretic
- bipartite graph
- random graphs
- network services
- graph matching
- clustering coefficient
- community discovery
- computer networks
- small world
- graph model
- graph mining