共 27 条
- [2] A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks [J]. ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 639 - 650
- [4] Method for Partial Recovering Source Code of Telecommunication Devices for Vulnerability Search [J]. 2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 76 - 80
- [6] Status-based Detection of malicious code in Internet of Things (IoT) devices [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
- [7] Vulnerability Mining Method Based on Code Property Graph and Attention BiLSTM [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (11): : 3404 - 3420
- [10] KFCM algorithm based on the source code mining method study [J]. 2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA), 2014, : 586 - 588