Login / Signup

Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits.

Timothée RiomArthur D. SawadogoKevin AllixTegawendé F. BissyandéNaouel MohaJacques Klein
Published in: Empir. Softw. Eng. (2021)
Keyphrases
  • automatic identification
  • multiscale
  • neural network
  • machine learning
  • social networks
  • information systems
  • feature selection
  • lightweight
  • intrusion detection