1. A deep learning approach to discover router firmware vulnerabilities;Abu-Mahfouz;IEEE Trans. Ind. Inform.,2024
2. Acharya, M., Xie, T., Pei, J., Xu, J., 100. Mining API patterns as partial orders from source code: from usage scenarios to specifications. In: Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering.
3. Alhuzali, A., Gjomemo, R., Eshete, B., 2018. NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications. In: 27th USENIX Security Symposium.
4. A software assurance reference dataset: Thousands of programs with known bugs;Black;J. Res. Natl. Inst. Stand. Technol.,2018
5. BGNN4vd: Constructing bidirectional graph neural-network for vulnerability detection;Cao;Inf. Softw. Technol.,2021