Login / Signup
Test mimicry to assess the exploitability of library vulnerabilities.
Hong Jin Kang
Truong Giang Nguyen
Bach Le
Corina S. Pasareanu
David Lo
Published in:
ISSTA (2022)
Keyphrases
</>
database
image sequences
information security
data sets
neural network
computer vision
clustering algorithm
decision trees
multi agent
expert systems
test cases
test data
statistical tests
security risks