Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code
Crossref DOI link: https://doi.org/10.3103/S0146411623080126
Published Online: 2024-02-29
Published Print: 2023-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Kubrin, G. S.
Zegzhda, D. P.
Text and Data Mining valid from 2023-12-01
Version of Record valid from 2023-12-01
Article History
Received: 10 July 2023
Revised: 25 July 2023
Accepted: 7 August 2023
First Online: 29 February 2024
CONFLICT OF INTEREST
: The authors of this work declare that they have no conflicts of interest.