{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:27:48Z","timestamp":1762579668040,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032103468","type":"print"},{"value":"9783032103475","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10347-5_12","type":"book-chapter","created":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:22:49Z","timestamp":1762579369000},"page":"123-137","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Predicting Zero-Day Vulnerabilities with\u00a0Machine Learning: Combining Code Analysis and\u00a0Exploit Patterns"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"El-Hajj","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,9]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Alkhadra, R., Abuzaid, J., AlShammari, M., Mohammad, N.: Solar winds hack: in-depth analysis and countermeasures. In: 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), pp.\u00a01\u20137. IEEE (2021)","DOI":"10.1109\/ICCCNT51525.2021.9579611"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Alon, U., Zilberstein, M., Levy, O., Yahav, E.: code2vec: learning distributed representations of code. Proc. ACM Program. Lang. 3(POPL), 1\u201329 (2019)","DOI":"10.1145\/3290353"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"77110","DOI":"10.1109\/ACCESS.2022.3191790","volume":"10","author":"TF Blauth","year":"2022","unstructured":"Blauth, T.F., Gstrein, O.J., Zwitter, A.: Artificial intelligence crime: an overview of malicious use and abuse of AI. IEEE Access 10, 77110\u201377122 (2022)","journal-title":"IEEE Access"},{"key":"12_CR4","first-page":"8921","volume":"33","author":"J Bose","year":"2020","unstructured":"Bose, J., et al.: Adversarial example games. Adv. Neural. Inf. Process. Syst. 33, 8921\u20138934 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"12_CR6","unstructured":"Cadar, C., Dunbar, D., Engler, D.: Klee: unassisted and automatic generation of high-coverage tests for complex systems programs. In: USENIX Symposium on Operating Systems Design and Implementation, pp. 209\u2013224 (2008)"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"12_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2024.107453","volume":"171","author":"J Chen","year":"2024","unstructured":"Chen, J., Wang, W., Liu, B., Cai, S., Towey, D., Wang, S.: Hybrid semantics-based vulnerability detection incorporating a temporal convolutional network and self-attention mechanism. Inf. Softw. Technol. 171, 107453 (2024)","journal-title":"Inf. Softw. Technol."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Y., Ding, Z., Alowain, L., Chen, X., Wagner, D.: Diversevul: a new vulnerable source code dataset for deep learning based vulnerability detection. In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 654\u2013668 (2023)","DOI":"10.1145\/3607199.3607242"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Feng, Z., et\u00a0al.: CodeBert: a pre-trained model for programming and natural languages. arXiv preprint arXiv:2002.08155 (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"issue":"2","key":"12_CR11","first-page":"1","volume":"32","author":"A Fioraldi","year":"2023","unstructured":"Fioraldi, A., Mantovani, A., Maier, D., Balzarotti, D.: Dissecting American fuzzy lop: a fuzzbench evaluation. ACM Trans. Software Eng. Methodol. 32(2), 1\u201326 (2023)","journal-title":"ACM Trans. Software Eng. Methodol."},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Garalov, T., Elhajj, M.: Enhancing IoT security: design and evaluation of a raspberry pi-based intrusion detection system. In: 2023 International Symposium on Networks, Computers and Communications (ISNCC), pp.\u00a01\u20137. IEEE (2023)","DOI":"10.1109\/ISNCC58260.2023.10323656"},{"key":"12_CR13","first-page":"507","volume":"35","author":"L Grinsztajn","year":"2022","unstructured":"Grinsztajn, L., Oyallon, E., Varoquaux, G.: Why do tree-based models still outperform deep learning on typical tabular data? Adv. Neural. Inf. Process. Syst. 35, 507\u2013520 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.comcom.2022.11.001","volume":"198","author":"Y Guo","year":"2023","unstructured":"Guo, Y.: A review of machine learning-based zero-day attack detection: challenges and future directions. Comput. Commun. 198, 175\u2013185 (2023)","journal-title":"Comput. Commun."},{"key":"12_CR15","unstructured":"Halstead, M.H.: Elements of Software Science (Operating and programming systems series). Elsevier Science Inc. (1977)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Hanif, H., Nasir, M.H.N.M., Ab\u00a0Razak, M.F., Firdaus, A., Anuar, N.B.: The rise of software vulnerability: taxonomy of software vulnerabilities detection and machine learning approaches. J. Network Comput. Appl. 179, 103009 (2021)","DOI":"10.1016\/j.jnca.2021.103009"},{"key":"12_CR17","unstructured":"Hellstr\u00f6m, P.: Tools for static code analysis: a survey (2009)"},{"issue":"1","key":"12_CR18","first-page":"881","volume":"3","author":"H Hussain","year":"2025","unstructured":"Hussain, H., Kainat, M., Ali, T., et al.: Leveraging AI and machine learning to detect and prevent cyber security threats. Dialogue Soc. Sci. Rev. (DSSR) 3(1), 881\u2013895 (2025)","journal-title":"Dialogue Soc. Sci. Rev. (DSSR)"},{"key":"12_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102308","volume":"106","author":"S Jeon","year":"2021","unstructured":"Jeon, S., Kim, H.K.: Autovas: an automated vulnerability analysis system with a deep learning approach. Comput. Secur. 106, 102308 (2021)","journal-title":"Comput. Secur."},{"key":"12_CR20","unstructured":"Kairouz, P., et\u00a0al.: Advances and open problems in federated learning. Found. Trends\u00ae Mach. Learn. 14(1\u20132), 1\u2013210 (2021)"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Katz, J.: Digital Signatures, vol.\u00a01. Springer (2010)","DOI":"10.1007\/978-0-387-27712-7"},{"key":"12_CR22","unstructured":"Kumar, M.S., Ben-Othman, J., Srinivasagan, K.: An investigation on wannacry ransomware and its detection. In: 2018 IEEE Symposium on Computers and Communications (ISCC), pp.\u00a01\u20136. IEEE (2018)"},{"issue":"6","key":"12_CR23","first-page":"321","volume":"19","author":"R Layton","year":"2014","unstructured":"Layton, R., Watters, P.A.: A methodology for estimating the tangible cost of data breaches. J. Inf. Secur. Appl. 19(6), 321\u2013330 (2014)","journal-title":"J. Inf. Secur. Appl."},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Li, J.: Vulnerabilities mapping based on owasp-sans: a survey for static application security testing (SAST). arXiv preprint arXiv:2004.03216 (2020)","DOI":"10.33166\/AETiC.2020.03.001"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Li, T., et al.: Domain-adaptive text classification with structured knowledge from unlabeled data. arXiv preprint arXiv:2206.09591 (2022)","DOI":"10.24963\/ijcai.2022\/585"},{"key":"12_CR26","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y.: SYSEVR: a framework for using deep learning to detect software vulnerabilities. In: IEEE Transactions on Dependable and Secure Computing (2018)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Li, Z., Zou, D., Xu, S., Jin, H., Zhu, Y., Chen, Z.: Vuldeepecker: a deep learning-based system for vulnerability detection. In: NDSS (2018)","DOI":"10.14722\/ndss.2018.23158"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2980\u20132988 (2017)","DOI":"10.1109\/ICCV.2017.324"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"4","author":"TJ McCabe","year":"1976","unstructured":"McCabe, T.J.: A complexity measure. IEEE Trans. Software Eng. 4, 308\u2013320 (1976)","journal-title":"IEEE Trans. Software Eng."},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1016\/j.procs.2013.01.119","volume":"16","author":"T McDermott","year":"2013","unstructured":"McDermott, T., Rouse, W., Goodman, S., Loper, M.: Multi-level modeling of complex socio-technical systems. Procedia Comput. Sci. 16, 1132\u20131141 (2013)","journal-title":"Procedia Comput. Sci."},{"key":"12_CR31","unstructured":"MITRE Corporation: Common Vulnerabilities and Exposures (CVE) (2025). https:\/\/cve.mitre.org"},{"key":"12_CR32","unstructured":"National Institute of Standards and Technology (NIST): National Vulnerability Database (NVD). https:\/\/nvd.nist.gov (2025)"},{"key":"12_CR33","unstructured":"Ross, N., Olukoya, O., Martinez-del Rincon, J., Carlin, D.: PevULN: a benchmark dataset for using machine learning to detect vulnerabilities in PE malware. In: Conference on Applied Machine Learning for Information Security. IEEE Xplore (2024)"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Sennrich, R., Haddow, B., Birch, A.: Neural machine translation of rare words with subword units. arXiv preprint arXiv:1508.07909 (2015)","DOI":"10.18653\/v1\/P16-1162"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Tariq, A.H.I.E., Tariq, M.B.I.E., Lu, S.: Hybrid AI-driven techniques for enhancing zeroday exploit detection in intrusion detection system (ids). In: 2024 3rd International Conference on Artificial Intelligence, Internet of Things and Cloud Computing Technology (AIoTC), pp. 156\u2013160. IEEE (2024)","DOI":"10.1109\/AIoTC63215.2024.10748333"},{"key":"12_CR36","unstructured":"Tree-sitter: Tree-sitter: a parser generator tool and incremental parsing library (2025). https:\/\/tree-sitter.github.io\/tree-sitter\/, accessed: 2025"},{"issue":"1","key":"12_CR37","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert, D.H., Macready, W.G.: No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1(1), 67\u201382 (1997)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"12_CR38","unstructured":"Zhou, Y., Liu, S., Siow, J., Du, X., Liu, Y.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In: NeurIPS (2019)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broad-Band and Wireless Computing, Communication and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10347-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T05:22:52Z","timestamp":1762579372000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10347-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,9]]},"ISBN":["9783032103468","9783032103475"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10347-5_12","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,9]]},"assertion":[{"value":"9 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sharjah","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 November 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/bwcca\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}