Author:
Aota Masaki,Kanehara Hideaki,Kubo Masaki,Murata Noboru,Sun Bo,Takahashi Takeshi
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be?;ACM Transactions on Software Engineering and Methodology;2024-06-27
2. SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation;Proceedings of the 29th ACM Symposium on Access Control Models and Technologies;2024-06-24
3. VCGERG;International Journal of Information Security and Privacy;2024-05-02
4. Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks;Proceedings of the IEEE/ACM 46th International Conference on Software Engineering;2024-04-12
5. Enhancing Security in Cloud Computing Using Artificial Intelligence (
AI
);Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection;2024-03-22