Funder
Institut des Sciences Mathématiques, Université du Québec à Montréal
Publisher
Springer Science and Business Media LLC
Reference54 articles.
1. Allix K, Bissyandé T F, Klein J, Le Traon Y (2015) Are your training datasets yet relevant?. In: International Symposium on Engineering Secure Software and Systems. Springer, pp 51–67
2. Arnold R S (1996) Software change impact analysis. IEEE Computer Society Press, California
3. Berr J (2017) “wannacry” ransomware attack losses could reach $4 billion. https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses/, Available: August 2018
4. Bissyande T F, Thung F, Wang S, Lo D, Jiang L, Reveillere L (2013) Empirical evaluation of bug linking. In: Software Maintenance and Reengineering (CSMR), 2013 17th European Conference on. IEEE, pp 89–98
5. Blum A, Mitchell T (1998) Combining labeled and unlabeled data with co-training. In: Proceedings of the eleventh annual conference on Computational learning theory. ACM, pp 92–100
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vulnerability discovery based on source code patch commit mining: a systematic literature review;International Journal of Information Security;2024-01-06
2. VFFINDER: A Graph-Based Approach for Automated Silent Vulnerability-Fix Identification;2023 15th International Conference on Knowledge and Systems Engineering (KSE);2023-10-18
3. Are security commit messages informative? Not enough!;Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering;2023-06-14
4. Data Quality for Software Vulnerability Datasets;2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE);2023-05
5. CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports;2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE);2023-05