Author:
Sultana Kazi Zakia,Boyd Charles B.,Williams Byron J.
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference61 articles.
1. Alonso C Early vulnerability detection for supporting secure programming. http://docplayer.net/1619013-Early-vulnerability-detection-for-supporting-secure-programming.html (2015). Accessed: 2017-08-04
2. Alves H, Fonseca B, Antunes N. Software metrics and security vulnerabilities: Dataset and exploratory study. In: 2016 12th European Dependable Computing Conference (EDCC), 2016;37–44
3. Batarseh F. Java nano patterns: a set of reusable objects. In: Proceedings of the 48th Annual Southeast Regional Conference, ACM SE ’10, pp. 60:1–60:4. ACM, New York, NY, USA 2010.
4. Bosu A. Characteristics of the vulnerable code changes identified through peer code review. In: Companion Proceedings of the 36th International Conference on Software Engineering, ICSE Companion 2014 (2014)
5. Chakraborty S, Krishna R, Ding Y, Ray B. Deep learning based vulnerability detection: Are we there yet. IEEE Transactions on Software Engineering 2022;5555(01):1–1