Author:
Diako Doffou Jerome,Achiepo Odilon Yapo M.,Mensah Edoete Patrice
Publisher
Springer International Publishing
Reference11 articles.
1. Dowd, M.: The Art of Software Security Assessment: Identifying and Preventing (2007)
2. Zulkernine, M.: Mitigating program security vulnerabilities: approaches and challenges. ACM Comput. Surv. (CSUR), 44(3), 11 (2012)
3. Cheng, H., Yan, X., Han, J.: Mining graph patterns. In: Aggarwal, Charu C., Han, J. (eds.) Frequent Pattern Mining, pp. 307–338. Springer, Cham (2014).
https://doi.org/10.1007/978-3-319-07821-2_13
4. Ghaffarian, S.M., Shahriari, H.R.: Software vulnerability analysis and discovery using machine-learning and data-mining techniques: a survey. ACM Comput. Surv. (CSUR) 50(4), 1–36 (2017)
5. Zimmermann, T.: Searching for a needle in a haystack: predicting security vulnerabilities for windows vista (2010)