[1] |
ZAPPONI C. GitHut - Programming Languages and GitHub[EB/OL]. [2019-12-17]. https://githut.info/.
|
[2] |
Q-SUCCESS W3Techs - World Wide Web Technology Surveys [EB/OL]. [2019-12-17]. https://w3techs.com/
|
[3] |
BACKES M, RIECK K, SKORUPPA M, et al. Efficient and Flexible Discovery of Php Application Vulnerabilities[C]// Proceedings of the 2017 2nd IEEE European Symposium on Security and Privacy. Piscataway: IEEE, 2017: 334-349.
|
[4] |
EXPLOIT DATABASE Exploit Database Statistics[EB/OL] . [2019-12-17]. https://www.exploit-db.com/exploit-database-statistics.
|
[5] |
YAN X X, WANG Q X, MA H T. Path Sensitive Static Analysis of Taint-style Vulnerabilities in PHP Code[C]// Proceedings of the 2017 17th IEEE International Conference on Communication Technology. Piscataway: IEEE, 2017: 1382-1386.
|
[6] |
BUJA G, JALIL K B A, ALI F B H M, et al. Detection Model for SQL Injection Attack: An Approach for Preventing A Web Application from the SQL Injection Attack[C]// Proceedings of the 2014 IEEE Symposium on Computer Applications and Industrial Electronics. Piscataway: IEEE, 2015: 60-64.
|
[7] |
LAL H, PAHWA G. Code Review Analysis of Software System Using Machine Learning Techniques[C]// Proceedings of the 2017 11th International Conference on Intelligent Systems and Control. Piscataway: IEEE, 2017: 8-13.
|
[8] |
ANBIYA D R, PURWARIANTI A, ASNAR Y. Vulnerability Detection in PHP Web Application Using Lexical Analysis Approach with Machine Learning[C]// Proceedings of the 2018 5th International Conference on Data and Software Engineering. Piscataway: IEEE, 2018: 8705809.
|
[9] |
YAMAGUCHI F, GOLDE N, ARP D, et al. Modeling and Discovering Vulnerabilities with Code Property Graphs[C]// Proceedings of the 2014 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2014: 590-604.
|
[10] |
ALON U, ZILBERSTEIN M, LEVY O, et al. A General Path-based Representation for Predicting Program Properties[J]. ACM SIGPLAN Notices, 2018, 53(4): 404-419.
doi: 10.1145/3296979.3192412
|
[11] |
ALON U, ZILBERSTEIN M, LEVY O, et al. Code2vec: Learning Distributed Representations of Code[J]. Proceedings of the ACM on Programming Languages, 2019, 3(POPL): 1-29.
|
[12] |
LI Y, WANG S, NGUYEN T N, et al. Improving Bug Detection Via Context-based Code Representation Learning and Attention-based Neural Networks[C]// Proceedings of the 2019 ACM on Programming Languages. New York: ACM, 2019: A162.
|
[13] |
WEI H H, LI M. Supervised Deep Features for Software Functional Clone Detection by Exploiting Lexical and Syntactical Information in Source Code[C]// Proceedings of the 2017 26th International Joint Conference on Artificial Intelligence. Melbourne: International Joint Conferences on Artificial Intelligence, 2017: 3034-3040.
|
[14] |
SHIDO Y, KOBAYASHI Y, YAMAMOTO A, et al. Automatic Source Code Summarization with Extended Tree-LSTM[C]// Proceedings of the 2019 International Joint Conference on Neural Networks. Piscataway: IEEE, 2019: 8851751.
|
[15] |
MOU L, LI G, ZHANG L, et al. Convolutional Neural Networks over Tree Structures for Programming Language Processing[C]// Proceedings of the 2016 30th AAAI Conference on Artificial Intelligence. Palo Alto: AAAI Press, 2016: 1287-1293.
|
[16] |
ZHANG J, WANG X, ZHANG H, et al. A Novel Neural Source Code Representation Based on Abstract Syntax Tree[C]// Proceedings of the 2019 International Conference on Software Engineering. Washington: IEEE Computer Society, 2019: 783-794.
|
[17] |
WHITE M, TUFANO M, VENDOME C, et al. Deep Learning Code Fragments for Code Clone Detection[C]// Proceedings of the 2016 31st IEEE/ACM International Conference on Automated Software Engineering. New York: ACM, 2016: 87-98.
|
[18] |
STIVALET B, FONG E. Large Scale Generation of Complex and Faulty PHP Test Cases[C]// Proceedings of the 2016 IEEE International Conference on Software Testing, Verification and Validation. Piscataway: IEEE, 2016: 409-415.
|