Login / Signup
Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits.
Timothée Riom
Arthur D. Sawadogo
Kevin Allix
Tegawendé F. Bissyandé
Naouel Moha
Jacques Klein
Published in:
Empir. Softw. Eng. (2021)
Keyphrases
</>
automatic identification
multiscale
neural network
machine learning
social networks
information systems
feature selection
lightweight
intrusion detection