咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 18 篇 期刊文献

馆藏范围

  • 45 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 40 篇 计算机科学与技术...
    • 27 篇 软件工程
    • 6 篇 信息与通信工程
    • 5 篇 电气工程
    • 3 篇 控制科学与工程
    • 2 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 45 篇 software vulnera...
  • 16 篇 deep learning
  • 11 篇 machine learning
  • 5 篇 information secu...
  • 5 篇 source code
  • 3 篇 natural language...
  • 3 篇 large language m...
  • 3 篇 security
  • 2 篇 representation l...
  • 2 篇 test platform
  • 2 篇 fuzzing
  • 2 篇 software securit...
  • 2 篇 taint analysis
  • 2 篇 symbolic executi...
  • 2 篇 evaluation metho...
  • 2 篇 loopholes
  • 2 篇 artificial intel...
  • 1 篇 fine-tuning tech...
  • 1 篇 graph neural net...
  • 1 篇 cyber security

机构

  • 4 篇 univ trento tren...
  • 3 篇 jiangsu univ sch...
  • 2 篇 harbin inst tech...
  • 2 篇 rovira & virgili...
  • 2 篇 northwestern pol...
  • 2 篇 peng cheng lab p...
  • 1 篇 fudan univ sch c...
  • 1 篇 macquarie univ 4...
  • 1 篇 yangzhou univ sc...
  • 1 篇 nanjing univ pos...
  • 1 篇 wright state uni...
  • 1 篇 meta seattle wa ...
  • 1 篇 luxembourg inst ...
  • 1 篇 aws ai labs adel...
  • 1 篇 luxembourg inst ...
  • 1 篇 nanyang technol ...
  • 1 篇 monash univ clay...
  • 1 篇 univ calif los a...
  • 1 篇 univ guilan comp...
  • 1 篇 athena res ctr i...

作者

  • 4 篇 marchetto alessa...
  • 3 篇 guo yuejun
  • 3 篇 chen jinfu
  • 3 篇 wu xiaoxue
  • 2 篇 zheng wei
  • 2 篇 casino fran
  • 2 篇 liu bo
  • 2 篇 he jun
  • 2 篇 ge yuan
  • 2 篇 cai saihua
  • 2 篇 wen xin-cheng
  • 2 篇 semasaba abubaka...
  • 2 篇 liu tao
  • 2 篇 bettaieb seifedd...
  • 2 篇 foulefack rosmae...
  • 2 篇 zhang chi
  • 2 篇 agyemang samuel ...
  • 2 篇 cai jun
  • 2 篇 li gaolei
  • 1 篇 zhang lin

语言

  • 45 篇 英文
检索条件"主题词=Software vulnerability detection"
45 条 记 录,以下是1-10 订阅
排序:
software vulnerability detection under poisoning attacks using CNN-based image processing
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2025年 第2期24卷 1-22页
作者: Gonzalez-Manzano, Lorena Garcia-Alfaro, Joaquin Univ Carlos III Madrid Leganes Spain Inst Polytech Paris SAMOVAR Telecom SudParis F-91120 Palaiseau France
Design flows, code errors, or inadequate countermeasures may occur in software development. Some of them lead to vulnerabilities in the code, opening the door to attacks. Assorted techniques are developed to detect vu... 详细信息
来源: 评论
A Systematic Literature Review on Automated software vulnerability detection Using Machine Learning
收藏 引用
ACM COMPUTING SURVEYS 2025年 第3期57卷 1-36页
作者: Harzevili, Nima shiri Belle, Alvine boaye Wang, Junjie Wang, Song Jiang, Zhen ming (jack) Nagappan, Nachiappan York Univ Elect Engn & Comp Sci Keele Campus Toronto ON Canada York Univ Elect Engn & Comp Sci Toronto ON Canada Chinese Acad Sci Inst Software Beijing Peoples R China Meta Seattle WA USA
In recent years, numerous Machine Learning (ML) models, including Deep Learning (DL) and classic ML models, have been developed to detect software vulnerabilities. However, there is a notable lack of comprehensive and... 详细信息
来源: 评论
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2025年 第2期24卷 1-66页
作者: Far, Seyed Mohammad Taghavi Feyzi, Farid Univ Guilan Comp Engn Rasht Iran
Large language models (LLMs) have emerged as transformative tools in the domain of software vulnerability detection and management, offering sophisticated capabilities in identifying, analyzing, and mitigating securit... 详细信息
来源: 评论
Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2024年 第6期23卷 3513-3526页
作者: Pham, Van-Hau Hien, Do Thi Thu Hoang, Hien Do Duy, Phan The Univ Informat Technol Informat Secur Lab Ho Chi Minh City Vietnam Vietnam Natl Univ Ho Chi Minh City Vietnam
The complex and rapidly evolving nature of modern software landscapes introduces challenges such as increasingly sophisticated cyber threats, the diversity in programming languages and coding styles, and the need to i... 详细信息
来源: 评论
Exploring Semantic Redundancy using Backdoor Triggers: A Complementary Insight into the Challenges Facing DNN-based software vulnerability detection
收藏 引用
ACM TRANSACTIONS ON software ENGINEERING AND METHODOLOGY 2024年 第4期33卷 1-28页
作者: Shao, Changjie Li, Gaolei Wu, Jun Zheng, Xi Shanghai Jiao Tong Univ 800 Dongchuan Rd Shanghai 200240 Peoples R China Waseda Univ 2-7 HibikinoWakamatsu Ku Kitakyushu Fukuoka 8080135 Japan Macquarie Univ 4 Res Pk Dr Sydney NSW 2113 Australia Univ Calif Los Angeles Los Angeles CA USA
To detect software vulnerabilities with better performance, deep neural networks (DNNs) have received extensive attention recently. However, these vulnerability detection DNN models trained with code representations a... 详细信息
来源: 评论
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2024年 第5期23卷 3311-3327页
作者: Guo, Yuejun Bettaieb, Seifeddine Casino, Fran Luxembourg Inst Sci & Technol LIST 5 Ave Hauts Fourneaux Esch Belval Luxembourg Rovira & Virgili Univ Dept Comp Engn & Math Tarragona Spain Athena Res Ctr Informat Management Syst Inst Artemidos 6 Maroussi Greece
As society's dependence on information and communication systems (ICTs) grows, so does the necessity of guaranteeing the proper functioning and use of such systems. In this context, it is critical to enhance the s... 详细信息
来源: 评论
Optimizing software vulnerability detection using RoBERTa and machine learning
收藏 引用
AUTOMATED software ENGINEERING 2024年 第2期31卷 40-40页
作者: Do, Cho Xuan Luu, Nguyen Trong Nguyen, Phuong Thi Lan Posts & Telecommun Inst Technol Fac Informat Secur Hanoi Vietnam Posts & Telecommun Inst Technol Fac Informat Technol Hanoi Vietnam
Detecting vulnerabilities in source code written in C and C + + is currently essential as attack techniques against systems seek to find, exploit, and attack these vulnerabilities. In this article, to improve the effe... 详细信息
来源: 评论
A deep learning-based approach for software vulnerability detection using code metrics
收藏 引用
IET software 2022年 第5期16卷 516-526页
作者: Subhan, Fazli Wu, Xiaoxue Bo, Lili Sun, Xiaobing Rahman, Muhammad Yangzhou Univ Jiangsu Coll Informat Engn Yangzhou 225000 Jiangsu Peoples R China
Vulnerabilities can have devastating effects on information security, affecting the economy, social stability, and national security. The idea of automatic vulnerability detection has always attracted researchers. Fro... 详细信息
来源: 评论
SwordDTA: A Dynamic Taint Analysis Tool for software vulnerability detection
收藏 引用
Wuhan University Journal of Natural Sciences 2016年 第1期21卷 10-20页
作者: CAI Jun ZOU Peng MA Jinxin HE Jun Science and Technology on Complex Electronic System Simulation Laboratory Academy of Equipment Beijing 101416China China Information Technology Security Evaluation Center Beijing 100085 China
software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to dete... 详细信息
来源: 评论
Transformer-Based Language Models for software vulnerability detection  22
Transformer-Based Language Models for Software Vulnerability...
收藏 引用
38th Annual Computer Security Applications Conference (ACSAC)
作者: Thapa, Chandra Jang, Seung Ick Ahmed, Muhammad Ejaz Camtepe, Seyit Pieprzyk, Josef Nepal, Surya CSIROs Data61 Marsfield NSW Australia
The large transformer-based language models demonstrate excellent performance in natural language processing. By considering the transferability of the knowledge gained by these models in one domain to other related d... 详细信息
来源: 评论