Publisher
Springer Science and Business Media LLC
Reference55 articles.
1. Alqudah AM, Qazan S, Al-Ebbini L, Alquran H, Qasmieh IA (2021) ECG heartbeat arrhythmias classification: a comparison study between different types of spectrum representation and convolutional neural networks architectures. J Ambient Intell Humnaiz Comput 13:1–31
2. Alves H, Fonseca B, Antunes N (2016) Software metrics and security vulnerabilities: dataset and exploratory study. In: 12th European dependable computing conference (EDCC). Gothenburg, Sweden, pp 37–44. https://doi.org/10.1109/EDCC.2016.34
3. Babalau I, Corlatescu D, Grigorescu O, Sandescu C, Dascalu M (2021) Severity prediction of software vulnerabilities based on their text description. In: 2021 23rd international symposium on symbolic and numeric algorithms for scientific computing (SYNASC), pp 171–177
4. Bilge L, Dumitra T (2012) Before we knew it: an empirical study of zero-day attacks in the real world. In: ACM conference on computer and communications security, pp 833–844
5. Blumberg R, Atre S (2003) The problem with unstructured data. DM Rev 13:42–49