The application of neural network for software vulnerability detection: a review
Author:
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Link
https://link.springer.com/content/pdf/10.1007/s00521-022-08046-y.pdf
Reference107 articles.
1. Liu L, De Vel O, Han QL, Zhang J, Xiang Y (2018) Detecting and preventing cyber insider threats: a survey. IEEE Commun Surveys Tutorials 20(2):1397–1417
2. Wang M, Zhu T, Zhang T, Zhang J, Yu S, Zhou W (2020) Security and privacy in 6g networks: new areas and new challenges. Digital Commun Netw 6(3):281–291
3. Techniques NR, Expose HDD, Target A, Lucrative M (2019) Mcafee labs threats report: December 2018. Comput Fraud Secur 2019(1):4. https://doi.org/10.1016/S1361-3723(19)30004-1
4. Lin G, Wen S, Han QL, Zhang J, Xiang Y (2020) Software vulnerability detection using deep neural networks: a survey. In: Proceedings of the IEEE pp 1–24, https://doi.org/10.1109/JPROC.2020.2993293
5. Ghaffarian SM, Shahriari HR (2017) Software vulnerability analysis and discovery using machine-learning and data-mining techniques: a survey. Acm Comput Surv 50(4):56. https://doi.org/10.1145/3092566
Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An empirical study on the impact of graph representations for code vulnerability detection using graph learning;2024 International Conference on Multimedia Analysis and Pattern Recognition (MAPR);2024-08-15
2. Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection;International Journal of Information Security;2024-08-13
3. VALIDATE: A deep dive into vulnerability prediction datasets;Information and Software Technology;2024-06
4. IT2F-SEDNN: an interval type-2 fuzzy logic-based stacked ensemble deep learning approach for early phase software dependability analysis;Innovations in Systems and Software Engineering;2024-05-19
5. A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement;Computers & Security;2024-05
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3