Login / Signup

Identifying the characteristics of vulnerable code changes: an empirical study.

Amiangshu BosuJeffrey C. CarverMunawar HafizPatrick HilleyDerek Janni
Published in: SIGSOFT FSE (2014)
Keyphrases
  • source code
  • data sets
  • three dimensional
  • database
  • real world
  • data mining
  • genetic algorithm
  • information systems
  • image segmentation
  • database systems
  • information technology
  • key features