2023
DOI: 10.1007/s13042-023-01824-7
|View full text |Cite
|
Sign up to set email alerts
|

An attention-based automatic vulnerability detection approach with GGNN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…At present, there is much research on key vulnerability search. Hao et al [24] and Tang et al [25] train neural network models to identify key vulnerabilities on network devices using static analysis, but this method is only applicable to a single device and cannot be dynamically combined with other devices in the network. Li et al [26] use the Kemeny constant as a global connectivity measure to identify network key connections and network decomposition is used to cut off connections to minimize global connectivity measures, thereby obtaining key vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…At present, there is much research on key vulnerability search. Hao et al [24] and Tang et al [25] train neural network models to identify key vulnerabilities on network devices using static analysis, but this method is only applicable to a single device and cannot be dynamically combined with other devices in the network. Li et al [26] use the Kemeny constant as a global connectivity measure to identify network key connections and network decomposition is used to cut off connections to minimize global connectivity measures, thereby obtaining key vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%