Login / Signup
An empirical study of vulnerability discovery methods over the past ten years.
Lei Cui
Jiancong Cui
Zhiyu Hao
Lun Li
Zhenquan Ding
Yongji Liu
Published in:
Comput. Secur. (2022)
Keyphrases
</>
computational cost
significant improvement
machine learning methods
optimization methods
real world
information retrieval
learning algorithm
benchmark datasets
cross validation
statistical models
computationally expensive