We show the effectiveness of our proposed method for vulnerability prediction from source code by carrying out exhaustive and realistic experiments under different regimes in comparison with state-of-art methods.
Full abstract in IEEE Xplore, DOI:10.1109/ACCESS.2020.3016774
Authors:
Zeki Bilgin, Mehmet Akif Ersoy, Elif Üstündağ Soykan, Emrah Tomur, Pınar Çomak, Leyli Karaçay – Ericsson Research
Published in IEEE Access Journal, August 14, 2020.
© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse.