共 140 条
[1]
Abah Joshua, 2015, International Journal of Network Security and Its Applications, V7, P15
[2]
Ageev S, 2015, 2015 XVIII INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), P5, DOI 10.1109/SCM.2015.7190394
[3]
Akanle M., 2020, P 2020 INT C ART INT, P1, DOI [10.1109/icABCD49160.2020.9183878, DOI 10.1109/ICABCD49160.2020.9183878]
[5]
Allamanis M., 2018, P INT C LEARNING REP
[7]
Alvares M, 2013, IEEE SYM COMPUT INTE, P59, DOI 10.1109/CICYBS.2013.6597207
[8]
[Anonymous], 2007, Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering, ESEC-FSE'07
[9]
[Anonymous], 2007, P NIPS WORKSH MACH L
[10]
Automation of Vulnerability Classification from its Description using Machine Learning
[J].
2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC),
2020,
:26-32