共 50 条
- [21] An empirical study on the importance of source code entities for requirements traceability Empirical Software Engineering, 2015, 20 : 442 - 478
- [23] Deep Domain Adaptation for Vulnerable Code Function Identification 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
- [24] VUDDY: A Scalable Approach for Vulnerable Code Clone Discovery 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 595 - 614
- [25] Discovering Vulnerable Functions: A Code Similarity Based Approach SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 390 - 402
- [26] Identifying the Characteristics of Vulnerable Code Changes: An Empirical Study 22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, : 257 - 268
- [27] Program Slice based Vulnerable Code Clone Detection 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 293 - 300
- [28] A Dataset of Vulnerable Code Changes of the Chromium OS project 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), 2021, : 244 - 245
- [29] VGRAPH: A Robust Vulnerable Code Clone Detection System Using Code Property Triplets 2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 53 - 69