Cited By
View all- Le YLi HWang BLuo ZYang AMa Z(2024)Supply Chain Security: Pre-training Model for Python Source Code Vulnerability Detection2024 3rd International Joint Conference on Information and Communication Engineering (JCICE)10.1109/JCICE61382.2024.00039(150-155)Online publication date: 10-May-2024
- Makkawy SAlblwi ADe Lucia MBarner K(2024)Improving Android Malware Detection with Entropy Bytecode-to-Image Encoding Framework2024 33rd International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN61486.2024.10637591(1-9)Online publication date: 29-Jul-2024
- Sewak MSahay SRathore H(2022)Deep Reinforcement Learning in the Advanced Cybersecurity Threat Detection and ProtectionInformation Systems Frontiers10.1007/s10796-022-10333-xOnline publication date: 30-Aug-2022
- Show More Cited By