Author:
Bozorgi Mehran,Saul Lawrence K.,Savage Stefan,Voelker Geoffrey M.
Cited by
89 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Holy Grail of Vulnerability Predictions;IEEE Security & Privacy;2024-01
2. Security bug reports classification using fasttext;International Journal of Information Security;2023-12-22
3. Commit-Level, Neural Vulnerability Detection and Assessment;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30
4. Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16
5. Enterprise Intranet Threat Intelligence Processing Framework Based on Open Source Community;2023 IEEE 7th Information Technology and Mechatronics Engineering Conference (ITOEC);2023-09-15