共 49 条
- [1] International Telecommunication Union, Global Internet Penetration and Digital Infrastructure Development Report: Technical Report, (2023)
- [2] Netflix, Continuous update, (2023)
- [3] YouTube, Continuous update, (2023)
- [4] Lakshmanan R., Wazirx cryptocurrency exchange loses $230 million in major security breach, (2024)
- [5] Ladisa P., Plate H., Martinez M., Barais O., SoK: Taxonomy of attacks on open-source software supply chains, 2023 IEEE symposium on security and privacy, pp. 1509-1526, (2023)
- [6] Hochreiter S., Schmidhuber J., Long short-term memory, Neural Comput, 9, 8, pp. 1735-1780, (1997)
- [7] Hamilton W., Ying Z., Leskovec J., Inductive representation learning on large graphs, Adv Neural Inf Process Syst, 30, (2017)
- [8] Vaswani A., Shazeer N., Parmar N., Uszkoreit J., Jones L., Gomez A.N., Et al., Attention is all you need, Adv Neural Inf Process Syst, 30, (2017)
- [9] Senanayake J., Kalutarage H., Petrovski A., Piras L., Al-Kadri M.O., Defendroid: Real-time android code vulnerability detection via blockchain federated neural network with XAI, J Inf Secur Appl, 82, (2024)
- [10] Eshghie M., Artho C., Gurov D., Dynamic vulnerability detection on smart contracts using machine learning, Proceedings of the 25th international conference on evaluation and assessment in software engineering, pp. 305-312, (2021)