Mining Node.js Vulnerabilities via Object Dependence Graph and Query.
Song LiMingqing KangJianwei HouYinzhi CaoPublished in: USENIX Security Symposium (2022)
Keyphrases
- directed graph
- graph structure
- data objects
- query processing
- user queries
- graph data
- response time
- database
- similarity graph
- query evaluation
- finding the shortest path
- graph patterns
- d objects
- data mining
- attack graph
- flow graph
- query graph
- data sources
- database objects
- structured data
- graph mining
- weighted graph
- random walk
- pattern mining
- query expansion
- quasi cliques
- web mining
- relevance feedback
- connected components
- keyword search
- reachability queries
- text mining
- data structure
- range queries
- undirected graph
- similarity scores
- sequential patterns
- graph databases
- overlapping communities
- pattern tree
- term dependence
- search engine
- tree nodes
- root node
- edge weights
- link analysis
- bipartite graph
- mining algorithm
- graph matching
- data mining techniques
- information security
- itemsets