no code implementations • 20 Jan 2022 • Laura Wartschinski, Yannic Noller, Thomas Vogel, Timo Kehrer, Lars Grunske
Context: Identifying potential vulnerable code is important to improve the security of our software systems.
Vulnerability Detection