注册
登录
Xedge
VulnerabilityDetection
返回
项目作者:
LauraWartschinski
项目描述 :
vulnerability detection in python source code with LSTM networks
高级语言:
TeX
项目主页:
项目地址:
git://github.com/LauraWartschinski/VulnerabilityDetection.git
创建时间:
2019-10-15T09:29:55Z
项目社区:
https://github.com/LauraWartschinski/VulnerabilityDetection
开源协议:
下载
tools in mining software repositories_1647608444919.pdf
An Open Dataset for Training Static PE MalwareMachine Learning Models_1647608444946.pdf
Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic_1647608444972.pdf
Data Mining Methods for Detection of New Malicious Executables_1647608444978.pdf
Learning to detect malicious executables in the wild_1647608444992.pdf
N-gram based Detection of New Malicious Code_1647608445005.pdf
predicting vulnerable software components_1647608445171.pdf
+ Automatic Feature Learning for Vulnerability Prediction_1647608445268.pdf
+ C CODE automatic vulnerability detection in source code using deep representation learning_1647608445343.pdf
+ Mining Fix Patterns for FindBugs Violations_1647608445413.pdf
+ VuRLE Automatic Vulnerability Detection and Repair by Learning from Examples_1647608445481.pdf
+ VulDeePecker A Deep Learning Based System For Vulnerability Detection_1647608445563.pdf
+ Vulnerability Extrapolation Assisted Discovery of Vulnerabilities using Machine Learning_1647608445625.pdf
+ predicting vulnerabilities n-gram_1647608445679.pdf
+ software vulnerability prediction text analysis_1647608445725.pdf
toward large-scale vulnerability discovery using machine learning_1647608445765.pdf
! optimize lstm for sequence classification_1647608444190.pdf
A Theoretically Grounded Application of Dropout inRecurrent Neural Networks_1647608444254.pdf
LSTM neural networks for language modeling_1647608444394.pdf
lstm original_1647608444497.pdf
lstm_1647608444536.pdf
Learning to Repair Software Vulnerabilitieswith Generative Adversarial Networks_1647608444572.pdf
Mining SQL Injection and Cross Site Scripting through Hybrid program analysis_1647608444600.pdf
Predicting SQL injection and cross site scripting vulnerabilities throughmining input sanitization patterns_1647608444653.pdf
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities_1647608444741.pdf
learning python code suggestion_1647608444796.pdf
mining bug databases_1647608444837.pdf
Towards a Taxonomy of Approaches for Mining of Source Code Repositories_1647608444871.pdf
Architecture_1647608442975.pdf
ArchitectureLSTM_1647608442981.pdf
FocusBlocks_1647608442985.pdf
GitCommitPreviousAfter_1647608442988.pdf
LSTM_1647608442992.pdf
Overview_1647608442995.pdf
Overview2_1647608442998.pdf
RecurrentNeuralNetwork_1647608443001.pdf
Word2Vec_1647608443005.pdf
collectData1_1647608443009.pdf
collectData2_1647608443012.pdf
hyper1_1647608443032.pdf
hyper2_1647608443044.pdf
legende_1647608443047.pdf
neuralnetwork_1647608443050.pdf
parameters_1647608443054.pdf
parametersmn_1647608443061.pdf
word2vecEmbedding_1647608443064.pdf
word2vecHyper_1647608443067.pdf
word2vecHyper1_1647608443071.pdf
word2vecHyper2_1647608443074.pdf
master_1647608443145.pdf
!PyT_1647608443278.pdf
+ An-automated-approach-to-detect-violations-with_1647608443324.pdf
+ Learning Quick Fixes from Code Repositories_1647608443398.pdf
+ Mining Version Histories to Guide Software Changes_1647608443412.pdf
+ PR-Miner automatically extracting implicit programming rules and detecting violations in large software code_1647608443426.pdf
+ VuRLE Automatic Vulnerability Detection and Repair by Learning from Examples_1647608443478.pdf
+ a deep language model for software code_1647608443541.pdf
+ automatic identification of security issues from commit messages and bug reports_1647608443564.pdf
+ automatic web vulnerabilities data mining_1647608443590.pdf
+ generalized vulnerability extrapolation using abstract syntax trees_1647608443636.pdf
+ learning unified features from natural and programming languages for locating buggy source code_1647608443654.pdf
+ predicting vulnerabilities n-gram_1647608443686.pdf
A Survey of Data Mining and Machine LearningMethods for Cyber Security Intrusion Detection_1647608443780.pdf
Automatic Composition of Music by LSTM_1647608443878.pdf
Challenges with ApplyingVulnerability Prediction Models_1647608443912.pdf
DeepFix Fixing Common C Language Errors by Deep Learning_1647608443951.pdf
LSTM networks for language modelling_1647608444067.pdf