C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Test mimicry to assess the exploitability of library vulnerabilities.
Hong Jin Kang
Truong Giang Nguyen
Bach Le
Corina S. Pasareanu
David Lo
Published in:
ISSTA (2022)
Keyphrases
</>
database
image sequences
information security
data sets
neural network
computer vision
clustering algorithm
decision trees
multi agent
expert systems
test cases
test data
statistical tests
security risks