共 26 条
[1]
VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective)
[J].
2019 IEEE 12TH CONFERENCE ON SOFTWARE TESTING, VALIDATION AND VERIFICATION (ICST 2019),
2019,
:402-413
[2]
DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level
[J].
2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1,
2018,
:100-105
[3]
Akram Junaid, 2018, P SEKE 2018 30 INT C, P354
[4]
Alam S, 2016, INT CONF DIGIT INFO, P79, DOI 10.1109/DICTAP.2016.7544005
[5]
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1109/MSR.2016.056, 10.1145/2901739.2903508]
[7]
[Anonymous], INT J COMPUT APPL
[8]
[Anonymous], INT J INFORM COMPUTE
[9]
[Anonymous], GSTF J COMPUTING
[10]
[Anonymous], IET INFORM SECURITY