ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Automated Software Vulnerability Analysis
Advances in Information Security - Cyber Situational Awareness
◽
10.1007/978-1-4419-0140-8_10
◽
2009
◽
pp. 201-223
Author(s):
Emre C. Sezer
◽
Chongkyung Kil
◽
Peng Ning
Keyword(s):
Vulnerability Analysis
◽
Software Vulnerability
◽
Automated Software
Download Full-text
Related Documents
Cited By
References
A software vulnerability analysis environment based on virtualization technology
2010 IEEE International Conference on Wireless Communications, Networking and Information Security
◽
10.1109/wcins.2010.5541854
◽
2010
◽
Author(s):
Wang Chunlei
◽
Wen Yan
◽
Dai Yiqi
Keyword(s):
Vulnerability Analysis
◽
Software Vulnerability
◽
Virtualization Technology
◽
Analysis Environment
Download Full-text
Automated Software Vulnerability Assessment with Concept Drift
2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR)
◽
10.1109/msr.2019.00063
◽
2019
◽
Author(s):
Triet Huynh Minh Le
◽
Bushra Sabir
◽
Muhammad Ali Babar
Keyword(s):
Vulnerability Assessment
◽
Concept Drift
◽
Software Vulnerability
◽
Automated Software
Download Full-text
Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey
IEEE Access
◽
10.1109/access.2020.3034766
◽
2020
◽
Vol 8
◽
pp. 197158-197172
Author(s):
Peng Zeng
◽
Guanjun Lin
◽
Lei Pan
◽
Yonghang Tai
◽
Jun Zhang
Keyword(s):
Deep Learning
◽
Vulnerability Analysis
◽
Software Vulnerability
◽
Learning Techniques
Download Full-text
Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045
10.3403/30325408
◽
2016
◽
Cited By ~ 3
Keyword(s):
Information Technology
◽
Vulnerability Analysis
◽
Software Vulnerability
◽
Information Technology Security
Download Full-text
Software Vulnerability Analysis Method Based on Adaptive-K Sequence Clustering
TELKOMNIKA Indonesian Journal of Electrical Engineering
◽
10.11591/telkomnika.v12i6.4610
◽
2014
◽
Vol 12
(6)
◽
Author(s):
Di Wu
◽
Jiadong Ren
Keyword(s):
Vulnerability Analysis
◽
Analysis Method
◽
Software Vulnerability
◽
Sequence Clustering
Download Full-text
Survey on Software Vulnerability Analysis Method Based on Machine Learning
2016 IEEE First International Conference on Data Science in Cyberspace (DSC)
◽
10.1109/dsc.2016.33
◽
2016
◽
Cited By ~ 1
Author(s):
Gong Jie
◽
Kuang Xiao-Hui
◽
Liu Qiang
Keyword(s):
Machine Learning
◽
Vulnerability Analysis
◽
Analysis Method
◽
Software Vulnerability
Download Full-text
Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis
2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS)
◽
10.1109/bigdatasecurity.2017.9
◽
2017
◽
Author(s):
Sun Jinan
◽
Pan Kefeng
◽
Chen Xuefeng
◽
Zhang Junfu
Keyword(s):
Vulnerability Analysis
◽
Software Vulnerability
◽
Security Patterns
Download Full-text
Software Vulnerability Analysis for Web Services Software Systems
11th IEEE Symposium on Computers and Communications (ISCC'06)
◽
10.1109/iscc.2006.151
◽
2006
◽
Cited By ~ 14
Author(s):
W.D. Yu
◽
D. Aravind
◽
P. Supthaweesuk
Keyword(s):
Web Services
◽
Vulnerability Analysis
◽
Software Systems
◽
Software Vulnerability
Download Full-text
Neural software vulnerability analysis using rich intermediate graph representations of programs
Information Sciences
◽
10.1016/j.ins.2020.11.053
◽
2021
◽
Vol 553
◽
pp. 189-207
Author(s):
Seyed Mohammad Ghaffarian
◽
Hamid Reza Shahriari
Keyword(s):
Vulnerability Analysis
◽
Software Vulnerability
◽
Graph Representations
◽
Intermediate Graph
Download Full-text
ASVG: Automated Software Vulnerability Sample Generation Technology Based on Source Code
Lecture Notes on Data Engineering and Communications Technologies - Advances on Broadband and Wireless Computing, Communication and Applications
◽
10.1007/978-3-030-02613-4_28
◽
2018
◽
pp. 316-325
Author(s):
Jun Yang
◽
Peng Zhou
◽
Yunze Ni
Keyword(s):
Source Code
◽
Software Vulnerability
◽
Automated Software
◽
Generation Technology
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close