{"id":"https://openalex.org/W3202958133","doi":"https://doi.org/10.1109/ijcnn52387.2021.9534259","title":"Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms","display_name":"Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms","publication_year":2021,"publication_date":"2021-07-18","ids":{"openalex":"https://openalex.org/W3202958133","doi":"https://doi.org/10.1109/ijcnn52387.2021.9534259","mag":"3202958133"},"language":"en","primary_location":{"id":"doi:10.1109/ijcnn52387.2021.9534259","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn52387.2021.9534259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112598351","display_name":"Vishnu Ramesh","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Vishnu Ramesh","raw_affiliation_strings":["SCMS School of Engineering & Technology, Ernakulam, Kerala, India"],"affiliations":[{"raw_affiliation_string":"SCMS School of Engineering & Technology, Ernakulam, Kerala, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111374609","display_name":"Sara Abraham","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sara Abraham","raw_affiliation_strings":["SCMS School of Engineering & Technology, Ernakulam, Kerala, India"],"affiliations":[{"raw_affiliation_string":"SCMS School of Engineering & Technology, Ernakulam, Kerala, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103016944","display_name":"P. Vinod","orcid":"https://orcid.org/0000-0001-6078-2014"},"institutions":[{"id":"https://openalex.org/I20497027","display_name":"Cochin University of Science and Technology","ror":"https://ror.org/00a4kqq17","country_code":"IN","type":"education","lineage":["https://openalex.org/I20497027"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"P Vinod","raw_affiliation_strings":["Cochin University of Science & Technology, Cochin, Kerala, India"],"affiliations":[{"raw_affiliation_string":"Cochin University of Science & Technology, Cochin, Kerala, India","institution_ids":["https://openalex.org/I20497027"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057158209","display_name":"Isham Mohamed","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Isham Mohamed","raw_affiliation_strings":["SCMS School of Engineering & Technology, Ernakulam, Kerala, India"],"affiliations":[{"raw_affiliation_string":"SCMS School of Engineering & Technology, Ernakulam, Kerala, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048951071","display_name":"Corrado Aaron Visaggio","orcid":"https://orcid.org/0000-0002-0558-4450"},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Corrado A. Visaggio","raw_affiliation_strings":["University of Sannio, Italy"],"affiliations":[{"raw_affiliation_string":"University of Sannio, Italy","institution_ids":["https://openalex.org/I16337185"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045371064","display_name":"Sonia Laudanna","orcid":"https://orcid.org/0009-0005-1256-7076"},"institutions":[{"id":"https://openalex.org/I16337185","display_name":"University of Sannio","ror":"https://ror.org/04vc81p87","country_code":"IT","type":"education","lineage":["https://openalex.org/I16337185"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Sonia Laudanna","raw_affiliation_strings":["University of Sannio, Italy"],"affiliations":[{"raw_affiliation_string":"University of Sannio, Italy","institution_ids":["https://openalex.org/I16337185"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5112598351"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1016,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.828641,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"6","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8026469349861145},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.7648250460624695},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6992742419242859},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6813220977783203},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6053006052970886},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6009433269500732},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.6003038883209229},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.5352080464363098},{"id":"https://openalex.org/keywords/statistical-classification","display_name":"Statistical classification","score":0.44594091176986694},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.44305652379989624},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.3525562882423401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2715596854686737},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2171212136745453},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10584685206413269}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8026469349861145},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.7648250460624695},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6992742419242859},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6813220977783203},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6053006052970886},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6009433269500732},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.6003038883209229},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.5352080464363098},{"id":"https://openalex.org/C110083411","wikidata":"https://www.wikidata.org/wiki/Q1744628","display_name":"Statistical classification","level":2,"score":0.44594091176986694},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.44305652379989624},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.3525562882423401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2715596854686737},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2171212136745453},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10584685206413269},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn52387.2021.9534259","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn52387.2021.9534259","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W110007310","https://openalex.org/W1553724776","https://openalex.org/W1971733255","https://openalex.org/W2047468043","https://openalex.org/W2098162425","https://openalex.org/W2101234009","https://openalex.org/W2600390930","https://openalex.org/W2767521898","https://openalex.org/W2794016958","https://openalex.org/W2888940240","https://openalex.org/W2920420505","https://openalex.org/W2948226814","https://openalex.org/W6675354045","https://openalex.org/W6750005347","https://openalex.org/W6754597433"],"related_works":["https://openalex.org/W2141388993","https://openalex.org/W1978034799","https://openalex.org/W2999607548","https://openalex.org/W2956597637","https://openalex.org/W2293245356","https://openalex.org/W4225160120","https://openalex.org/W23486959","https://openalex.org/W1588942021","https://openalex.org/W2155353733","https://openalex.org/W4384518368"],"abstract_inverted_index":{"As":[0],"the":[1,9,18,32,74,119,137,141,148,165,180],"field":[2],"of":[3,34,76,92,121],"computer":[4],"science":[5],"has":[6,12,25],"advanced":[7],"over":[8],"years,":[10],"there":[11],"been":[13,26],"a":[14,41,68],"tremendous":[15],"increase":[16,24,30],"in":[17,31,45,71,94,100],"software":[19,35,38,46],"being":[20],"created,":[21],"and":[22,63,90,102,129,154,162,177],"this":[23,106],"accompanied":[27],"by":[28,52,123],"an":[29,80],"number":[33],"vulnerabilities.":[36],"A":[37],"vulnerability":[39,77,111],"is":[40,78],"security":[42],"flaw":[43],"found":[44],"that":[47,151],"can":[48,114],"potentially":[49],"be":[50,115],"exploited":[51],"attackers":[53],"to":[54,85,96,117],"perform":[55],"cyber":[56],"attacks.":[57],"Since":[58],"automatic":[59],"approaches":[60],"for":[61],"identifying":[62],"analyzing":[64],"vulnerabilities":[65,93],"have":[66],"become":[67],"trending":[69],"topic":[70],"research,":[72],"community,":[73],"classification":[75],"still":[79],"open":[81],"issue.":[82],"Developers":[83],"need":[84],"know":[86],"more":[87],"about":[88],"characteristics":[89],"types":[91],"systems":[95],"adopt":[97],"suitable":[98],"countermeasures":[99],"current":[101],"next":[103],"versions.":[104],"With":[105],"paper,":[107],"we":[108],"investigate":[109],"whether":[110],"descriptions":[112],"alone":[113],"used":[116],"identify":[118],"type":[120],"vulnerability,":[122],"comparing":[124],"five":[125],"shallow":[126,153,170],"learning":[127,132],"models":[128],"fourteen":[130],"deep":[131,155],"models.":[133],"The":[134],"model":[135],"with":[136,182],"highest":[138],"F1-score":[139],"was":[140],"Stacking-DNN":[142],"(98.8%).":[143],"On":[144],"performing":[145],"comprehensive":[146],"analysis,":[147],"experiments":[149],"demonstrate":[150],"both":[152],"classifiers":[156,171],"show":[157],"comparable":[158],"performance":[159,174],"when":[160,175],"trained":[161,176],"tested":[163,178],"using":[164,179],"dataset":[166,181],"without":[167],"duplicates,":[168],"while":[169],"showed":[172],"better":[173],"duplicates.":[183]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
