Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey.
Seyed Mohammad GhaffarianHamid Reza ShahriariPublished in: ACM Comput. Surv. (2017)
Keyphrases
- data mining techniques
- machine learning
- data mining
- knowledge discovery
- pattern recognition
- machine learning and data mining algorithms
- data mining systems
- historical data
- association rule mining
- software systems
- machine learning methods
- data mining methods
- software developers
- machine learning and data mining
- machine learning algorithms
- statistical methods
- user interface
- software development
- artificial intelligence
- learning tasks
- source code
- knowledge acquisition
- computer systems
- reinforcement learning
- decision trees
- data mining applications
- machine learning approaches
- software package
- software architecture
- inductive learning
- explanation based learning
- learning systems
- databases
- text classification
- supervised learning
- information extraction
- scientific discovery
- association rules
- data analysis
- feature selection
- real world
- discovery process
- intrusion detection
- web usage mining
- embedded systems
- intrusion detection system
- web mining
- cloud computing
- active learning
- learning algorithm
- neural network