• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4596632)   Today's Articles (2637)   Subscriber (49344)
For: Liang H, Xie Z, Chen Y, Ning H, Wang J. FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.102032] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
Number Cited by Other Article(s)
1
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.103023] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
2
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102417] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA