Author:
Avgerinos Thanassis,Brumley David,Davis John,Goulden Ryan,Nighswander Tyler,Rebert Alex,Williamson Ned
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Subject
Law,Electrical and Electronic Engineering,Computer Networks and Communications
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cyber operations and automatic hack backs under international law on necessity;Computer Law & Security Review;2024-07
2. How the Training Procedure Impacts the Performance of Deep Learning-based Vulnerability Patching;Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering;2024-06-18
3. Generative AI for pentesting: the good, the bad, the ugly;International Journal of Information Security;2024-03-15
4. How Effective Are Neural Networks for Fixing Security Vulnerabilities;Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis;2023-07-12
5. Artificial intelligence and military superiority;Artificial Intelligence and International Conflict in Cyberspace;2023-04-26