Binary Vulnerability Mining Based on Long Short-Term Memory Network.
Wenlei OuyangMeng LiQiqi LiuJianchao WangPublished in: WAC (2021)
Keyphrases
- attack graphs
- network traffic
- network model
- data mining
- buffer overflow
- communication networks
- data mining methods
- decision making
- web mining
- wireless sensor networks
- decision trees
- data mining techniques
- network structure
- complex networks
- neural network
- computer networks
- peer to peer
- text mining
- recurrent neural networks
- link prediction
- artificial intelligence
- network management
- network monitoring
- network configuration
- attack graph