Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Past year
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
Mar 15, 2024 · We propose a vulnerability detection algorithm based on residual graph attention networks for source code imbalance (RGAN).
Aug 6, 2024 · The suggested detection methodology involved gathering flow status information, extracting features, and categorizing the collected feature values. Additionally ...
Missing: graphs. | Show results with:graphs.
Mar 15, 2024 · They identify code vulnerabilities by scanning source code to analyze lexical, grammar, control flow, and data flow information. For instance, typical ...
4 days ago · The PDG serves as a representation of a program's control and data flow dependencies among program elements. The PDG is represented as a directed graph G ...
Jul 10, 2024 · We propose a deep learning malware detection system based on the classification of function control flow graphs with Ghidra P-Code node-level features.
Aug 26, 2024 · To address this challenge, we propose a new form of a graph, namely the extended control-flow graph (e-CFG), to simplify and fuse the structural features of ...
Jul 16, 2024 · In this study, the QtAC method is compared to conventional material (or energy) flow-based network analysis, which most of the literature to date has employed.
Apr 8, 2024 · Section 6 introduces Pathfinder, a tool that reconstructs the control flow graph of the victim program and identifies the execution path leading to the observed ...
Mar 2, 2024 · To enhance log analysis in complex software systems, we propose LEMUR. This framework replaces traditional rule- based methods with an information entropy-based ...
Mar 28, 2024 · This study presents a novel deep learning-based vulnerability detection system for Java code. Leveraging hybrid feature extraction through graph and sequence- ...