Login / Signup
Where is it? Tracing the Vulnerability-relevant Files from Vulnerability Reports.
Jiamou Sun
Jieshan Chen
Zhenchang Xing
Qinghua Lu
Xiwei Xu
Liming Zhu
Published in:
ICSE (2024)
Keyphrases
</>
buffer overflow
databases
machine learning
real time
neural network
optimal solution
closely related
file system
data lineage