期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
JFinder:A novel architecture for java vulnerability identification based quad self-attention and pre-training mechanism
1
作者 Jin Wang Zishan Huang +1 位作者 Hui Xiao Yinhao Xiao 《High-Confidence Computing》 EI 2023年第4期30-40,共11页
Software vulnerabilities pose significant risks to computer systems,impacting our daily lives,productivity,and even our health.Identifying and addressing security vulnerabilities in a timely manner is crucial to preve... Software vulnerabilities pose significant risks to computer systems,impacting our daily lives,productivity,and even our health.Identifying and addressing security vulnerabilities in a timely manner is crucial to prevent hacking and data breaches.Unfortunately,current vulnerability identification methods,including classical and deep learning-based approaches,exhibit critical drawbacks that prevent them from meeting the demands of the contemporary software industry.To tackle these issues,we present JFinder,a novel architecture for Java vulnerability identification that leverages quad self-attention and pre-training mechanisms to combine structural information and semantic representations.Experimental results demonstrate that JFinder outperforms all baseline methods,achieving an accuracy of 0.97 on the CWE dataset and an F1 score of 0.84 on the PROMISE dataset.Furthermore,a case study reveals that JFinder can accurately identify four cases of vulnerabilities after patching. 展开更多
关键词 Software vulnerabilities Security risks vulnerability identification methods Pre-training Structural information Self-attention
原文传递
Vulnerable Point Identification Using Heterogeneous Interdependent Node Theory for Distribution Systems 被引量:1
2
作者 Yu Zhang Xiaohui Song +2 位作者 Liwei Xie Hua Liu Yong Li 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2022年第2期591-598,共8页
In order to reduce the occurrence or expansion of accidents and maintain safety in distribution networks,it is essential to find out the vulnerable points for the power system in time.In this paper,a vulnerable point ... In order to reduce the occurrence or expansion of accidents and maintain safety in distribution networks,it is essential to find out the vulnerable points for the power system in time.In this paper,a vulnerable point identification method based on heterogeneous interdependent(HI)node theory and risk theory is proposed.Compared with the methods based on betweenness theory,the method based on HI nodes theory can deal with the shortcomings of the power flow shortest path,and consider the direct and indirect relationship of nodes.It is more suitable for identifying vulnerable points in a realistic power system.First,according to the analysis of heterogenous interdependent networks,the HI nodes are defined and used to evaluate the utility coupling value of each node.Then an identification indicator,which combines the utility coupling value and the risk indicators,is utilized to evaluate the vulnerability of each node.Results show that the proposed method is a suitable one to find the vulnerable points and better than betweennessbased methods for a distribution network. 展开更多
关键词 Distribution network heterogenous interdependent nodes utility coupling vulnerable point identification
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部