Cited By
View all- Han LPan SXing ZSun JYitagesu SZhang XFeng Z(2025)
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-Tail Software Through Feature InferenceIEEE Transactions on Software Engineering10.1109/TSE.2024.352328451:2(466-483)Online publication date: 1-Feb-2025 - Mohamed Mohideen MNadeem MHardy JAli HTariq USabrina FWaqar MAhmed S(2024)Behind the Code: Identifying Zero-Day Exploits in WordPressFuture Internet10.3390/fi1607025616:7(256)Online publication date: 19-Jul-2024
- SUMOTO KKANAKOGI KWASHIZAKI HTSUDA NYOSHIOKA NFUKAZAWA YKANUKA H(2024)Automated Labeling of Entities in CVE Vulnerability Descriptions with Natural Language ProcessingIEICE Transactions on Information and Systems10.1587/transinf.2023DAP0013E107.D:5(674-682)Online publication date: 1-May-2024
- Show More Cited By