Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network
Vulnerability
Control flow graph
DOI:
10.1016/j.comcom.2022.10.021
Publication Date:
2022-11-02T16:47:10Z
AUTHORS (5)
ABSTRACT
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (38)
CITATIONS (6)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....