Detecting vulnerable software functions via text and dependency features.
Wenlin XuTong LiJinsong WangYahui TangPublished in: Soft Comput. (2023)
Keyphrases
- structural features
- feature space
- user interface
- information retrieval
- feature extraction
- additional features
- co occurrence
- search engine
- false positives
- information content
- text mining
- image features
- low level
- web pages
- automatically extracted
- textual features
- text retrieval
- development process
- software architecture
- spatial information
- software systems
- software development
- feature set
- feature vectors
- high level