共 27 条
- [1] Experimenting Machine Learning Techniques to Predict Vulnerabilities [J]. 2016 SEVENTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2016, : 151 - 156
- [2] Bhatt N, 2017, INT J MATH ENG MANAG, V2, P288, DOI 10.33889/IJMEMS.2017.2.4-022
- [6] Hall Mark, 2009, ACM SIGKDD explorations newsletter, V11, P10, DOI 10.1145/1656274.1656278
- [7] A Comparative Study on Vulnerabilities in Categories of Clones and Non-Cloned Code [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 3, 2016, : 8 - 14
- [9] Kapur P. K., 2015, INT C QUAL REL INF T, P34
- [10] Kindy D. A., 2011, 2011 IEEE 15th International Symposium on Consumer Electronics, P468, DOI 10.1109/ISCE.2011.5973873