BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection
☆10Oct 2, 2020Updated 5 years ago
Alternatives and similar repositories for BGNN4VD
Users that are interested in BGNN4VD are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Oct 14, 2025Updated 6 months ago
- ☆23Nov 10, 2023Updated 2 years ago
- Supplementary code and data of the paper Evaluating network embedding techniques' performances in software bug prediction☆11Aug 13, 2021Updated 4 years ago
- ESEC/FSE'21: Prediction-Preserving Program Simplification☆10Oct 4, 2022Updated 3 years ago
- Software defect prediction (predicting logical errors in source code files) using recurrent neural network and convolutional neural netwo…☆12Oct 16, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Daphne Yao, Na Meng. Example-Based Vulnerability Detection and Repair in Java Code 30th IEEE/AC…☆10Jul 31, 2022Updated 3 years ago
- ☆16Jan 17, 2024Updated 2 years ago
- HiddenCPG: Large-Scale Vulnerable Clone Detection Using Subgraph Isomorphism of Code Property Graphs☆43Oct 18, 2022Updated 3 years ago
- software defect prediction☆11Jan 2, 2023Updated 3 years ago
- ☆10Feb 8, 2015Updated 11 years ago
- [ISSTA 2024] PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open Source Software☆27Sep 13, 2025Updated 7 months ago
- MiDas: Multi-granularity Detector for Vulnerability Fixes (IEEE TSE)☆15Dec 5, 2023Updated 2 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- VulDeePecker: A Deep Learning-Based System for Vulnerability Detection☆349Nov 17, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆50Jan 19, 2019Updated 7 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- ☆10Sep 24, 2019Updated 6 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- ☆22Nov 17, 2021Updated 4 years ago
- FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.☆16Sep 27, 2024Updated last year
- Ethereum ERC-20 Test Standard Token (TST)☆10Mar 14, 2025Updated last year
- VulDeePecker algorithm implemented in Python☆113May 8, 2019Updated 6 years ago
- FUNDED is a novel learning framework for building vulnerability detection models.☆130Dec 6, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A LEO Constellation Emulator for Security Experimentation☆20Mar 2, 2023Updated 3 years ago
- ☆16May 29, 2022Updated 3 years ago
- ☆14May 28, 2024Updated last year
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- ☆350Oct 24, 2024Updated last year
- ☆12Oct 5, 2022Updated 3 years ago
- ☆32Jan 14, 2025Updated last year
- ☆11Jul 8, 2024Updated last year
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0☆12Jan 24, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Software defect prediction using ensemble learning☆23Nov 29, 2017Updated 8 years ago
- ☆18Mar 18, 2024Updated 2 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- WAF Environment for OpenAI Gym☆15Dec 13, 2020Updated 5 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- ML models often mispredict, and it is hard to tell when and why. We present a data mining based approach to discover whether there is a c…☆17Jun 6, 2022Updated 3 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year