2021
DOI: 10.1007/s10489-021-02324-3
|View full text |Cite
|
Sign up to set email alerts
|

Prediction of software vulnerability based deep symbiotic genetic algorithms: Phenotyping of dominant-features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 34 publications
0
21
0
1
Order By: Relevance
“…Thereafter, computing the classification error after removing the irrelevant features that corresponding to zeros in BU. This is performed by using Equation (12).…”
Section: Proposed Aoaga Feature Selectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Thereafter, computing the classification error after removing the irrelevant features that corresponding to zeros in BU. This is performed by using Equation (12).…”
Section: Proposed Aoaga Feature Selectionmentioning
confidence: 99%
“…In Equation ( 12), λ ∈ [0, 1] refers to the weight applied to balance between the two sides of Equation (12). N F refers to the number of features, and |BU i | is the number of selected features corresponding to ones inside U i .…”
Section: Proposed Aoaga Feature Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Image segmentation has been tackled using a variety of approaches and algorithms [20]. Examples of the used optimization algorithms are the Bat Algorithm (BA) [21], Firefly Algorithm (FA) [22], Genetic Algorithm (GA) [23], Gray Wolf Optimizer (GWO) [24,25], Dragonfly Algorithm (DA) [26], Moth-Flame Optimization Algorithm (MFO) [27], Marine Predators Algorithm (MPA) [28], Arithmetic Optimization Algorithm (AOA) [29], Aquila Optimizer (AO) [30], Krill Herd Optimizer (KHO) [31], Harris Hawks Optimizer (HHO) [32], Red Fox Optimization Algorithm (RFOA) [33], Artificial Bee Colony Algorithm (ABC) [34], and Artificial Ecosystem-based Optimization [35]. Many other optimizers can be found in [36,37].…”
Section: Introductionmentioning
confidence: 99%
“…Vulnerability detection play a significant part in software security and quality [1]. This paper discussed the subject of detecting the correlation of the most relevant vulnerability metrics in software maintainability by utilizing deep learning.…”
Section: Introductionmentioning
confidence: 99%