Cited By
View all- Groppe JGroppe SSenf DMöller R(2024)There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability DetectionInformation10.3390/info1504021615:4(216)Online publication date: 11-Apr-2024
- Zhang HLi GLi SLiu HWang SLi JLi BXu WChen JZhang YXue JWang SBai GYuan X(2024)How to Efficiently Manage Critical Infrastructure Vulnerabilities? Toward Large Code-graph ModelsProceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis10.1145/3689217.3690622(25-34)Online publication date: 19-Nov-2024
- Ami AMoran KPoshyvanyk DNadkarni A(2024)"False negative - that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00019(3979-3997)Online publication date: 19-May-2024
- Show More Cited By