{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T01:31:50Z","timestamp":1769909510873,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031702440","type":"print"},{"value":"9783031702457","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70245-7_25","type":"book-chapter","created":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:18:02Z","timestamp":1725999482000},"page":"355-372","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Rapid Review on\u00a0Graph-Based Learning Vulnerability Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7701-1634","authenticated-orcid":false,"given":"Rosma\u00ebl Zidane","family":"Lekeufack Foulefack","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6833-896X","authenticated-orcid":false,"given":"Alessandro","family":"Marchetto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed, S., Taha, D.: Machine learning for software vulnerability detection: a survey. In: Proceedings of the of International Conference on Contemporary Information Technology and Mathematics. IEEE (2022)","DOI":"10.1109\/ICCITM56309.2022.10031734"},{"key":"25_CR2","unstructured":"Arp, D., et al.: Dos and don\u2019ts of machine learning in computer security. In: Proceedings of USENIX Security Symposium, pp. 3971\u20133988 (2022)"},{"issue":"2","key":"25_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-030-32489-6_13","volume-title":"Contemporary Empirical Methods in Software Engineering","author":"B Cartaxo","year":"2020","unstructured":"Cartaxo, B., Pinto, G., Soares, S.: Rapid reviews in software engineering. In: Felderer, M., Travassos, G. (eds.) Contemporary Empirical Methods in Software Engineering, pp. 357\u2013384. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-32489-6_13"},{"issue":"09","key":"25_CR5","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","volume":"48","author":"S Chakraborty","year":"2022","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: are we there yet? IEEE Trans. Softw. Eng. 48(09), 3280\u20133296 (2022)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Chen, X., et al.: Vulchecker: achieving more effective taint analysis by identifying sanitizers automatically. In: Proceedings of International Conference on Trust, Security and Privacy in Computing and Communications, pp. 774\u2013782 (2021)","DOI":"10.1109\/TrustCom53373.2021.00112"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Fu, M., Tantithamthavorn, C.: LineVul: a transformer-based line-level vulnerability prediction. In: Proceedings of International Conference on Mining Software Repositories, pp. 608\u2013620. ACM (2022)","DOI":"10.1145\/3524842.3528452"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Qi, H., Hu, J.: VulPecker: an automated vulnerability detection system based on code similarity analysis. In: Proceedings of Annual Conference on Computer Security Applications. ACM (2016)","DOI":"10.1145\/2991079.2991102"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: VulDeePecker: a deep learning-based system for vulnerability detection. In: Proceedings of Network and Distributed System Security Symposium, San Diego, CA. Internet Society (2018)","DOI":"10.14722\/ndss.2018.23158"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Marchetto, A.: Can explainability and deep-learning be used for localizing vulnerabilities in source code? In: Proceedings of International Conference on Automation of Software Test (2024)","DOI":"10.1145\/3644032.3644448"},{"issue":"1","key":"25_CR11","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10664-021-10029-x","volume":"27","author":"T Sonnekalb","year":"2022","unstructured":"Sonnekalb, T., Heinze, T.S., M\u00e4der, P.: Deep security analysis of program code: a systematic literature review. Empir. Softw. Eng. 27(1), 2 (2022)","journal-title":"Empir. Softw. Eng."},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Vagavolu, D., Swarna, K.C., Chimalakonda, S.: A mocktail of source code representations. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 1296\u20131300 (2021)","DOI":"10.1109\/ASE51524.2021.9678551"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Wu, B., Zou, F.: Code vulnerability detection based on deep sequence and graph models: a survey. Secur. Commun. Netw. 2022 (2022)","DOI":"10.1155\/2022\/1176898"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Zeng, P., Lin, G., Pan, L., Tai, Y., Zhang, J.: Software vulnerability analysis and discovery using deep learning techniques: a survey. IEEE Access 8 (2020)","DOI":"10.1109\/ACCESS.2020.3034766"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhu, J., Yang, Y., Wen, M., Jin, H.: Comparing the performance of different code representations for learning-based vulnerability detection. In: Proceedings of Asia-Pacific Symposium on Internetware. ACM (2023)","DOI":"10.1145\/3609437.3609464"},{"key":"25_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J Zhou","year":"2020","unstructured":"Zhou, J., et al.: Graph neural networks: a review of methods and applications. AI Open 1, 57\u201381 (2020)","journal-title":"AI Open"},{"key":"25_CR17","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70245-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T20:21:01Z","timestamp":1725999661000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70245-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031702440","9783031702457"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70245-7_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pisa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}