共 50 条
- [1] The Research on Software Security Vulnerabilities Mining [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON TECHNOLOGY MANAGEMENT AND INNOVATION (TMI 2010), 2010, : 333 - 335
- [2] Mining Software Repositories - A Comparative Analysis [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (08): : 161 - 174
- [3] On the Detection and Analysis of Software Security Vulnerabilities [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
- [4] Visual data mining and analysis of software repositories [J]. COMPUTERS & GRAPHICS-UK, 2007, 31 (03): : 410 - 428
- [9] A Survey on Mining Software Repositories [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (05): : 1384 - 1406
- [10] Impact analysis by mining software and change request repositories [J]. 2005 11TH INTERNATIONAL SYMPOSIUM ON SOFTWARE METRICS (METRICS), 2005, : 259 - 267