2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON) 2019
DOI: 10.1109/ukrcon.2019.8879997
|View full text |Cite
|
Sign up to set email alerts
|

Automated Software Vulnerability Testing Using Deep Learning Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 28 publications
0
1
0
Order By: Relevance
“…The reason supervised learning is mostly employed in the articles could be that supervised learning models are comparatively simple and produce results with high confidence and accuracy. We also noticed that only 4 out of 263 (2%) articles [3,61,225,238] used reinforcement learning. This implies a little interest of researchers in the applications of reinforcement learning to SE.…”
Section: Relation Of Sdlc Stages With ML Typesmentioning
confidence: 91%
“…The reason supervised learning is mostly employed in the articles could be that supervised learning models are comparatively simple and produce results with high confidence and accuracy. We also noticed that only 4 out of 263 (2%) articles [3,61,225,238] used reinforcement learning. This implies a little interest of researchers in the applications of reinforcement learning to SE.…”
Section: Relation Of Sdlc Stages With ML Typesmentioning
confidence: 91%
“…ϵ-greedy method occasionally selects random events with the ϵ value probability. Commonly used epsilon values found in the literature are 0.1 [68], 0.2 [44], 0.5 [71]. An improved version of the ϵ-greedy method called decayed-ϵ-greedy utilized [75] [14] [69] in many existing studies.…”
Section: Threats To Validitymentioning
confidence: 99%