Machine Learning Methods for Software Vulnerability Detection. Chernis, B. & Verma, R. M. In Verma, R. M. & Kantarcioglu, M., editors, IWSPA@CODASPY, pages 31-39, 2018. ACM. Link Paper bibtex @inproceedings{conf/codaspy/ChernisV18,
added-at = {2019-09-17T00:00:00.000+0200},
author = {Chernis, Boris and Verma, Rakesh M.},
biburl = {https://www.bibsonomy.org/bibtex/2fca72179e193e5737d7b25d5f8d690a8/dblp},
booktitle = {IWSPA@CODASPY},
crossref = {conf/codaspy/2018iwspa},
editor = {Verma, Rakesh M. and Kantarcioglu, Murat},
ee = {https://doi.org/10.1145/3180445.3180453},
interhash = {5d3f5180a0380259978cd254bd02c484},
intrahash = {fca72179e193e5737d7b25d5f8d690a8},
keywords = {dblp},
pages = {31-39},
publisher = {ACM},
timestamp = {2019-09-18T11:44:01.000+0200},
title = {Machine Learning Methods for Software Vulnerability Detection.},
url = {http://dblp.uni-trier.de/db/conf/codaspy/iwspa2018.html#ChernisV18},
year = 2018
}
Downloads: 0
{"_id":"7sH4HxuXvuKteoEmR","bibbaseid":"chernis-verma-machinelearningmethodsforsoftwarevulnerabilitydetection-2018","author_short":["Chernis, B.","Verma, R. M."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2019-09-17T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Chernis"],"firstnames":["Boris"],"suffixes":[]},{"propositions":[],"lastnames":["Verma"],"firstnames":["Rakesh","M."],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2fca72179e193e5737d7b25d5f8d690a8/dblp","booktitle":"IWSPA@CODASPY","crossref":"conf/codaspy/2018iwspa","editor":[{"propositions":[],"lastnames":["Verma"],"firstnames":["Rakesh","M."],"suffixes":[]},{"propositions":[],"lastnames":["Kantarcioglu"],"firstnames":["Murat"],"suffixes":[]}],"ee":"https://doi.org/10.1145/3180445.3180453","interhash":"5d3f5180a0380259978cd254bd02c484","intrahash":"fca72179e193e5737d7b25d5f8d690a8","keywords":"dblp","pages":"31-39","publisher":"ACM","timestamp":"2019-09-18T11:44:01.000+0200","title":"Machine Learning Methods for Software Vulnerability Detection.","url":"http://dblp.uni-trier.de/db/conf/codaspy/iwspa2018.html#ChernisV18","year":"2018","bibtex":"@inproceedings{conf/codaspy/ChernisV18,\n added-at = {2019-09-17T00:00:00.000+0200},\n author = {Chernis, Boris and Verma, Rakesh M.},\n biburl = {https://www.bibsonomy.org/bibtex/2fca72179e193e5737d7b25d5f8d690a8/dblp},\n booktitle = {IWSPA@CODASPY},\n crossref = {conf/codaspy/2018iwspa},\n editor = {Verma, Rakesh M. and Kantarcioglu, Murat},\n ee = {https://doi.org/10.1145/3180445.3180453},\n interhash = {5d3f5180a0380259978cd254bd02c484},\n intrahash = {fca72179e193e5737d7b25d5f8d690a8},\n keywords = {dblp},\n pages = {31-39},\n publisher = {ACM},\n timestamp = {2019-09-18T11:44:01.000+0200},\n title = {Machine Learning Methods for Software Vulnerability Detection.},\n url = {http://dblp.uni-trier.de/db/conf/codaspy/iwspa2018.html#ChernisV18},\n year = 2018\n}\n\n","author_short":["Chernis, B.","Verma, R. M."],"editor_short":["Verma, R. M.","Kantarcioglu, M."],"key":"conf/codaspy/ChernisV18","id":"conf/codaspy/ChernisV18","bibbaseid":"chernis-verma-machinelearningmethodsforsoftwarevulnerabilitydetection-2018","role":"author","urls":{"Link":"https://doi.org/10.1145/3180445.3180453","Paper":"http://dblp.uni-trier.de/db/conf/codaspy/iwspa2018.html#ChernisV18"},"keyword":["dblp"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/rakesh verma?items=1000","dataSources":["seGkXRkGoHfA3ej9n"],"keywords":["dblp"],"search_terms":["machine","learning","methods","software","vulnerability","detection","chernis","verma"],"title":"Machine Learning Methods for Software Vulnerability Detection.","year":2018}