Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Automatic classification method for software vulnerability based on deep neural network
Software vulnerabilities are the root causes of various security risks. Once a vulnerability is
exploited by malicious attacks, it will greatly compromise the safety of the system, and may …
exploited by malicious attacks, it will greatly compromise the safety of the system, and may …
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network
To address the problem that the traditional vectored representation of software vulnerability
data has high-dimensional sparsity and leads to unsatisfactory automatic classification, this …
data has high-dimensional sparsity and leads to unsatisfactory automatic classification, this …
An automatic software vulnerability classification framework using term frequency-inverse gravity moment and feature selection
Vulnerability classification is an important activity in software development and software
quality maintenance. A typical vulnerability classification model usually involves a stage of …
quality maintenance. A typical vulnerability classification model usually involves a stage of …
An automatic algorithm for software vulnerability classification based on CNN and GRU
Q Wang, Y Li, Y Wang, J Ren - Multimedia Tools and Applications, 2022 - Springer
In order to improve the management efficiency of software vulnerability classification, reduce
the risk of system being attacked and destroyed, and save the cost for vulnerability repair …
the risk of system being attacked and destroyed, and save the cost for vulnerability repair …
Context-aware software vulnerability classification using machine learning
Managing the vulnerabilities reported by a number of security scanning software is a tedious
and time-consuming task, especially in large-scale, modern communication networks …
and time-consuming task, especially in large-scale, modern communication networks …
Detecting unknown vulnerabilities in smart contracts using opcode sequences
Unknown vulnerabilities, also known as zero-day vulnerabilities, are vulnerabilities in
software, systems, or networks that have not yet been publicly disclosed or fixed. If these …
software, systems, or networks that have not yet been publicly disclosed or fixed. If these …
Machine learning techniques for python source code vulnerability detection
Software vulnerabilities are a fundamental reason for the prevalence of cyber attacks and
their identification is a crucial yet challenging problem in cyber security. In this paper, we …
their identification is a crucial yet challenging problem in cyber security. In this paper, we …
Large-scale empirical study of important features indicative of discovered vulnerabilities to assess application security
Existing research on vulnerability discovery models shows that the existence of
vulnerabilities inside an application may be linked to certain features, eg, size or complexity …
vulnerabilities inside an application may be linked to certain features, eg, size or complexity …
A novel approach to continuous CVE analysis on enterprise operating systems for system vulnerability assessment
Advances in information and technology have provided great opportunities and
conveniences for human life. However, with this process, attackers have switched to …
conveniences for human life. However, with this process, attackers have switched to …
An automatic vulnerability classification framework based on BiGRU-TextCNN
M Pan, P Wu, Y Zou, C Ruan, T Zhang - Procedia Computer Science, 2023 - Elsevier
Abstract Common Vulnerabilities and Exposures (CVE) records known vulnerabilities and
provides standardized descriptions. By utilizing Common Weakness Enumeration (CWE) to …
provides standardized descriptions. By utilizing Common Weakness Enumeration (CWE) to …