Security Code Review by LLMs: A Deep Dive into Responses.
Jiaxin YuPeng LiangYujia FuAmjed TahirMojtaba ShahinChong WangYangxiao CaiPublished in: CoRR (2024)
Keyphrases
- access control
- statistical databases
- security policies
- security issues
- windows xp
- deep learning
- network security
- information security
- intrusion detection
- data security
- security problems
- source code
- key management
- computer security
- security mechanisms
- security vulnerabilities
- database
- computer systems
- data management
- information systems
- security systems