Computer Science
Malicious Attack
100%
Secure Information System
100%
Level Similarity
100%
Discovered Vulnerability
100%
Information Infrastructure
100%
Vulnerability Assessment
100%
Information Technology
50%
Source Codes
50%
Critical Information
50%
Program Analysis
50%
Keyphrases
Program Analysis
50%
Vulnerability
50%
Binary-level
42%
Source Level
28%
Vulnerable Code
28%
Code-based
28%
Vulnerability Analysis
14%
Source Code Level
14%
Software Patch
14%
Human Error
14%
Information Systems Infrastructure
14%
Critical Information Infrastructure
14%
Effective Techniques
14%
Practice Errors
14%
Coding Practices
14%
Patch Validation
14%
Developing Capability
14%
Code Level
14%
Economical Impact
14%
Malicious Attacks
14%
Patch Repair
14%
Impact on Society
14%
Code Clone
14%
Similarity Test
14%
Secure Information Systems
14%
Developing Methodologies
14%
Software Assistance
14%
Software Reliability
7%
Information Technology
7%
Secure Software
7%
Error-prone
7%