相似文献/References:
[1]马凯,蔡皖东,姚烨.Web2.0环境下SQL注入漏洞注入点提取方法[J].计算机技术与发展,2013,(03):121.
MA Kai,CAI Wan-dong,YAO Ye.Injection Point Extraction Approach in SQL Injection Vulnerability under Web2. 0 Environment[J].,2013,(05):121.
[2]陈春玲,张凡,余瀚.Web应用程序漏洞检测系统设计[J].计算机技术与发展,2017,27(09):101.
CHEN Chun-ling,ZHANG Fan,YU Han. Design of Vulnerability Detection System for Web Application Program[J].,2017,27(05):101.
[3]董国良,臧 洌,李 航,等.基于污点分析的二进制程序漏洞检测[J].计算机技术与发展,2018,28(03):137.[doi:10.3969/ j. issn.1673-629X.2018.03.029]
DONG Guo-liang,ZANG Lie,LI Hang,et al.Vulnerability Detection of Binary Program Based on Dynamic Taint Analysis[J].,2018,28(05):137.[doi:10.3969/ j. issn.1673-629X.2018.03.029]
[4]黄东晋,秦 汉,郭 昊.基于 BERT-CNN 的电影原声智能问答系统[J].计算机技术与发展,2020,30(11):158.[doi:10. 3969 / j. issn. 1673-629X. 2020. 11. 029]
HUANG Dong-jin,QIN Han,GUO Hao.Movie Soundtrack Intelligent Question and Answer System Based on BERT-CNN[J].,2020,30(05):158.[doi:10. 3969 / j. issn. 1673-629X. 2020. 11. 029]
[5]李 阳,杜睿山 *,张豪鹏.面向医药信息的知识图谱构建[J].计算机技术与发展,2022,32(10):189.[doi:10. 3969 / j. issn. 1673-629X. 2022. 10. 031]
LI Yang,DU Rui-shan *,ZHANG Hao-peng.Construction of Knowledge Graph for Medical Data[J].,2022,32(05):189.[doi:10. 3969 / j. issn. 1673-629X. 2022. 10. 031]
[6]尚福华,徐凡钧,曹茂俊.测井处理解释领域知识图谱构建方法研究[J].计算机技术与发展,2022,32(12):206.[doi:10. 3969 / j. issn. 1673-629X. 2022. 12. 031]
SHANG Fu-hua,XU Fan-jun,CAO Mao-jun.Research on Knowledge Graph Construction for Logging Process and Interpretation Domain[J].,2022,32(05):206.[doi:10. 3969 / j. issn. 1673-629X. 2022. 12. 031]
[7]傅紫薇,沈子牛,陈云芳,等.以太坊智能合约的漏洞自动化修复技术研究[J].计算机技术与发展,2023,33(02):110.[doi:10. 3969 / j. issn. 1673-629X. 2023. 02. 017]
FU Zi-wei,SHEN Zi-niu,CHEN Yun-fang,et al.Research on Automatic Vulnerability Repair Technology of Smart Contracts on Ethereum[J].,2023,33(05):110.[doi:10. 3969 / j. issn. 1673-629X. 2023. 02. 017]
[8]熊可欣,李 涛*,余 琴,等.PDGcross:基于跨文件图表征的源代码漏洞检测[J].计算机技术与发展,2023,33(08):102.[doi:10. 3969 / j. issn. 1673-629X. 2023. 08. 015]
XIONG Ke-xin,LI Tao*,YU Qin,et al.PDGcross:Source Code Vulnerability Detection Based on Cross-file Graph Representation[J].,2023,33(05):102.[doi:10. 3969 / j. issn. 1673-629X. 2023. 08. 015]
[9]刘哲峰,梁 平,顾进广.基于坐标映射及多重图划分的图相似查询研究[J].计算机技术与发展,2023,33(12):58.[doi:10. 3969 / j. issn. 1673-629X. 2023. 12. 008]
LIU Zhe-feng,LIANG Ping,GU Jin-guang.Research on Graph Similarity Query Based on Coordinate Mapping and Multigraph Partition[J].,2023,33(05):58.[doi:10. 3969 / j. issn. 1673-629X. 2023. 12. 008]
[10]巴伦敦,梁 平,顾进广.基于预处理-枚举的子图匹配算法[J].计算机技术与发展,2023,33(12):85.[doi:10. 3969 / j. issn. 1673-629X. 2023. 12. 012]
BA Lun-dun,LIANG Ping,GU Jin-guang.Subgraph Matching Algorithm Based on Preprocessing-enumeration[J].,2023,33(05):85.[doi:10. 3969 / j. issn. 1673-629X. 2023. 12. 012]