Login / Signup

Where is it? Tracing the Vulnerability-relevant Files from Vulnerability Reports.

Jiamou SunJieshan ChenZhenchang XingQinghua LuXiwei XuLiming Zhu
Published in: ICSE (2024)
Keyphrases
  • buffer overflow
  • databases
  • machine learning
  • real time
  • neural network
  • optimal solution
  • closely related
  • file system
  • data lineage