Detecting recurring and similar software vulnerabilities.
Nam H. PhamTung Thanh NguyenHoan Anh NguyenXinying WangAnh Tuan NguyenTien N. NguyenPublished in: ICSE (2) (2010)
Keyphrases
- computer systems
- software systems
- information security
- real time
- software application
- requirements engineering
- software design
- software development
- data processing
- test cases
- source code
- mobile devices
- development process
- automatic detection
- design patterns
- case study
- software package
- neural network
- database
- security risks
- security patterns
- security vulnerabilities