Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of 2018
DOI: 10.1145/3236024.3264836
|View full text |Cite
|
Sign up to set email alerts
|

Towards data-driven vulnerability prediction for requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Top-k accuracy Among the top-K samples, the number of samples labeled as "vulnerable" is vˆ. Hidden Layer [5,10,20,50,100] SV58 NB(Vector size=75. Window size=4) Linear Regression (Vector size=150, window size=8) Logistic Regression (vector size=150, window size=8, Liblinear solver, regularization wt (c)=2.0, tolerance value 0.001) Decision Tree (vector size=150, window size=12, max depth=10, gini splitting criterion) RF (vector size=150, window size=4, max depth=10, entropy, no of trees=100) CDNNC (vector size=150, window size=8, 5 layers, 200 neurons, learning_rate=0.05, binary cross-entropy, 10 epochs, batch size=100) SDNNC (vector size=75, window size=8, 5 layers, 250 neurons, 0.0005 beta value) KNN (vector size=75, window size=8, k=18, uniform distance weights) SVM (Radial Basis Function, gamma value=0.02, c=2.…”
Section: Sv48mentioning
confidence: 99%
See 1 more Smart Citation
“…Top-k accuracy Among the top-K samples, the number of samples labeled as "vulnerable" is vˆ. Hidden Layer [5,10,20,50,100] SV58 NB(Vector size=75. Window size=4) Linear Regression (Vector size=150, window size=8) Logistic Regression (vector size=150, window size=8, Liblinear solver, regularization wt (c)=2.0, tolerance value 0.001) Decision Tree (vector size=150, window size=12, max depth=10, gini splitting criterion) RF (vector size=150, window size=4, max depth=10, entropy, no of trees=100) CDNNC (vector size=150, window size=8, 5 layers, 200 neurons, learning_rate=0.05, binary cross-entropy, 10 epochs, batch size=100) SDNNC (vector size=75, window size=8, 5 layers, 250 neurons, 0.0005 beta value) KNN (vector size=75, window size=8, k=18, uniform distance weights) SVM (Radial Basis Function, gamma value=0.02, c=2.…”
Section: Sv48mentioning
confidence: 99%
“…No of training iterations=150, Batch_size=32, Dimensionality of output feature vectors= No of filters N=128, Dimensionality of word embeddings=300SV32Grid Search Unspecified SV44, SV67 RF (n_estimators[10,150], max_leaf_nodes=[2,50], min_samples_leaf=[1,20], max_features=[0.01,1], min_sample_split=[2,20], max_depth[1,10])LR (C=[1.0, 10.0], max_iter=[50,200], verbose=[0,10]) KNN (leaf_size=[10,100], n_neighbors=[1,10]) MLP (alpha=[0.0001,0.001], learning_rate_init=[0.001,0.01], power_t=[0.1,1], max_iter[50,300], momentum=[0.1,1], n_iter_no_change) NB (var_smoothing[0.0,1.0]) SMOTE (k[1,20], m[50,400], r [1,6]) SV50, SV66 RF (No. of trees) KNN (No.…”
mentioning
confidence: 99%
“…In vulnerability studies, issue tracking systems like Bugzilla, code repositories like Github, and vulnerability databases such as NVD, CVE, and CWE have been utilized [79]. In addition to these datasets, some studies have used Android [65,68,69] or web [63,70,72] (PHP source code) datasets.…”
Section: Data Mining In Vulnerability Analysismentioning
confidence: 99%