Vulnerability Recognition by Execution Trace Differentiation.
Fabien Patrick ViertelOliver KarrasKurt SchneiderPublished in: Softwaretechnik-Trends (2017)
Keyphrases
- recognition rate
- recognition accuracy
- pattern recognition
- execution traces
- execution model
- object recognition
- correct recognition
- recognition algorithm
- activity recognition
- robust recognition
- feature extraction
- unsupervised learning
- recognition engine
- data sets
- visual recognition
- automatic recognition
- character recognition
- handwritten characters
- handwriting recognition
- document analysis
- shape recognition
- data flow
- image recognition
- partial occlusion
- image matching
- image sequences
- data mining