Login / Signup
Identifying the characteristics of vulnerable code changes: an empirical study.
Amiangshu Bosu
Jeffrey C. Carver
Munawar Hafiz
Patrick Hilley
Derek Janni
Published in:
SIGSOFT FSE (2014)
Keyphrases
</>
source code
data sets
three dimensional
database
real world
data mining
genetic algorithm
information systems
image segmentation
database systems
information technology
key features