{"id":"https://openalex.org/W2895787676","doi":"https://doi.org/10.1145/3264437.3264489","title":"Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection","display_name":"Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection","publication_year":2018,"publication_date":"2018-09-10","ids":{"openalex":"https://openalex.org/W2895787676","doi":"https://doi.org/10.1145/3264437.3264489","mag":"2895787676"},"language":"en","primary_location":{"id":"doi:10.1145/3264437.3264489","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264489","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051057565","display_name":"Alexander Pechenkin","orcid":null},"institutions":[{"id":"https://openalex.org/I212220629","display_name":"Peter the Great St. Petersburg Polytechnic University","ror":"https://ror.org/02x91aj62","country_code":"RU","type":"education","lineage":["https://openalex.org/I212220629"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Alexander Pechenkin","raw_affiliation_strings":["Peter the Great St. Petersburg Polytechnic University, Saint-Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Peter the Great St. Petersburg Polytechnic University, Saint-Petersburg, Russia","institution_ids":["https://openalex.org/I212220629"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5066844408","display_name":"Roman Demidov","orcid":null},"institutions":[{"id":"https://openalex.org/I212220629","display_name":"Peter the Great St. Petersburg Polytechnic University","ror":"https://ror.org/02x91aj62","country_code":"RU","type":"education","lineage":["https://openalex.org/I212220629"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Roman Demidov","raw_affiliation_strings":["Peter the Great St. Petersburg Polytechnic University, Saint-Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"Peter the Great St. Petersburg Polytechnic University, Saint-Petersburg, Russia","institution_ids":["https://openalex.org/I212220629"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5051057565"],"corresponding_institution_ids":["https://openalex.org/I212220629"],"apc_list":null,"apc_paid":null,"fwci":1.5707,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8827871,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7461163997650146},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5574444532394409},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.5484748482704163},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.528296709060669},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5044230222702026},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.4706133008003235},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3907814025878906},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11331361532211304}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7461163997650146},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5574444532394409},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.5484748482704163},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.528296709060669},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5044230222702026},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.4706133008003235},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3907814025878906},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11331361532211304},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3264437.3264489","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3264437.3264489","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Security of Information and Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5299999713897705}],"awards":[],"funders":[{"id":"https://openalex.org/F4320324099","display_name":"Russian Science Foundation","ror":"https://ror.org/03y2gwe85"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W71795751","https://openalex.org/W1498436455","https://openalex.org/W1922655562","https://openalex.org/W2091432990","https://openalex.org/W2095739681","https://openalex.org/W2131774270","https://openalex.org/W2131876387","https://openalex.org/W2136189984","https://openalex.org/W2136922672","https://openalex.org/W2147152072","https://openalex.org/W2147800946","https://openalex.org/W2170302354","https://openalex.org/W2250445771","https://openalex.org/W2251939518","https://openalex.org/W2256679588","https://openalex.org/W2575109289","https://openalex.org/W2576057564","https://openalex.org/W2592249290","https://openalex.org/W2622826443","https://openalex.org/W2760860087","https://openalex.org/W2811129197","https://openalex.org/W2912500072","https://openalex.org/W2949888546","https://openalex.org/W2950133940","https://openalex.org/W2992891118","https://openalex.org/W3124769650","https://openalex.org/W4312531999"],"related_works":["https://openalex.org/W3009238340","https://openalex.org/W3197060662","https://openalex.org/W2908875379","https://openalex.org/W4221136938","https://openalex.org/W4213225422","https://openalex.org/W4206762304","https://openalex.org/W3013699712","https://openalex.org/W4297725807","https://openalex.org/W3158586592","https://openalex.org/W4206984194"],"abstract_inverted_index":{"This":[0,25,68],"paper":[1],"1":[2],"addresses":[3],"a":[4],"problem":[5,22],"of":[6,30,38,47,65],"vulnerability":[7,20,73],"detection":[8,21],"in":[9,35,49],"software":[10],"represented":[11],"as":[12],"assembly":[13],"code.":[14],"An":[15],"extended":[16],"approach":[17,33],"to":[18,43,61],"the":[19,45,62,66,72],"is":[23,57],"proposed.":[24],"work":[26],"concentrates":[27],"on":[28],"improvement":[29],"neural":[31,55],"network-based":[32],"described":[34],"previous":[36],"works":[37],"authors.":[39],"The":[40,52],"authors":[41],"propose":[42],"include":[44],"morphology":[46],"instructions":[48],"vector":[50],"representations.":[51],"bidirectional":[53],"recurrent":[54],"network":[56],"used":[58],"with":[59],"access":[60],"execution":[63],"traces":[64],"program.":[67],"has":[69],"significantly":[70],"improved":[71],"detecting":[74],"accuracy.":[75]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
