Login / Signup
Discovering Vulnerable Functions: A Code Similarity Based Approach.
Aditya Chandran
Lokesh Jain
Sanjay Rawat
Kannan Srinathan
Published in:
SSCC (2016)
Keyphrases
</>
source code
similarity measure
similarity metrics
database
similarity measurement
distance measure
similarity retrieval
similarity metric
hamming distance
semantic similarity
basis functions
distance function
pairwise
case study
feature selection
information systems
artificial intelligence
neural network