Publisher
Springer Nature Switzerland
Reference17 articles.
1. Ahmed, S., Taha, D.: Machine learning for software vulnerability detection: a survey. In: Proceedings of the of International Conference on Contemporary Information Technology and Mathematics. IEEE (2022)
2. Arp, D., et al.: Dos and don’ts of machine learning in computer security. In: Proceedings of USENIX Security Symposium, pp. 3971–3988 (2022)
3. Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77–101 (2006)
4. Cartaxo, B., Pinto, G., Soares, S.: Rapid reviews in software engineering. In: Felderer, M., Travassos, G. (eds.) Contemporary Empirical Methods in Software Engineering, pp. 357–384. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-32489-6_13
5. Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: are we there yet? IEEE Trans. Softw. Eng. 48(09), 3280–3296 (2022)