共 50 条
[31]
Settles Burr, 2012, Active Learning, V6, P1, DOI [DOI 10.2200/S00429ED1V01Y201207AIM018, DOI 10.1007/978-3-031-01560-1, 10.1007/978-3-031-01560-1]
[34]
Shin Yonghee., 2008, P 4 ACM WORKSHOP QUA, P47
[36]
Theisen C., 2017, P INT WORKSH SEC SOF
[37]
Theisen C., 2015, P INT C SOFTW TEST V
[38]
Risk-Based Attack Surface Approximation: How Much Data is Enough?
[J].
2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE TRACK (ICSE-SEIP 2017),
2017,
:273-282
[39]
Approximating Attack Surfaces with Stack Traces
[J].
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2,
2015,
:199-208
[40]
Trautman L.J., 2015, Journal of Law, Technology Policy, V2015, P341