1 |
Hongjun Choi, Jinyoung Choi, Software Development Life Cycle and Static Analysis Tool, 818-819, 2019
|
2 |
Software security weakness diagnosis guide for e-government software development security inspectors, pp. 26-27, 2019
|
3 |
Martin White, Michele Tufano et al, deep learning code fragments for code clone detection, 2016
|
4 |
Hoa Khanh Dam, Truyen Tran, Trang Pham, A deep language model for software code, 2016
|
5 |
Xi Victoria Lin, Chenglong Wang, et al, Program Synthesis from Natural Language Using Recurrent Neural Networks, 2017
|
6 |
Rebecca L. Russell, Louis Kim, et al, Automated Vulnerability Detection in Source Code Using Deep Representation Learning, 2018
|
7 |
Won-kyung Lee, Min-Ju Lee, Dongsu Seo, Application of Machine Learning Techniques for the Classification of Source Code Vulnerability, pp. 6-7 2020
|
8 |
Youngho Lee, Seong-Yun Hong, A machin learning approach to the prediction of indifidual travel mode choices, 1011-1024, 2019
|
9 |
Jiho Bang, Rhan Ha, Evaluation Methodology of Diagnostic Tool for Security Weakness of e-GOV Software, pp. 336 The Korean Institute of Communications and Information Sciences 2013-04 Vol.38C No.04
|
10 |
U.S. Department of Homeland Security (DHS), Software Assurance, https://us-cert.cisa.gov/sites/default/files/publications/infosheet_SoftwareAssurance.pdf
|
11 |
Google Plus Will Be Shut Down After User Information Was Exposed, https://www.nytimes.com/
|
12 |
Coding Error Sends 2019 Subaru Ascents to the Car Crusher, https://spectrum.ieee.org
|