共 50 条
- [1] Software vulnerability prioritization using vulnerability description [J]. International Journal of System Assurance Engineering and Management, 2021, 12 : 58 - 64
- [2] Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2017, : 125 - 136
- [5] Automated Software Vulnerability Detection in Statement Level using Vulnerability Reports [J]. PROCEEDINGS OF 2024 28TH INTERNATION CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2024, 2024, : 454 - 455
- [8] A vulnerability prioritization system using a fuzzy risk analysis approach [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 525 - 539
- [9] Testing for software vulnerability using environment perturbation [J]. DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2000, : 603 - 612