{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T21:50:27Z","timestamp":1767995427422,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T00:00:00Z","timestamp":1737676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T00:00:00Z","timestamp":1737676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-025-00983-8","type":"journal-article","created":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T16:17:58Z","timestamp":1737735478000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Large language models based vulnerability detection: How does it enhance performance?"],"prefix":"10.1007","volume":"24","author":[{"given":"Cho Do","family":"Xuan","sequence":"first","affiliation":[]},{"given":"Dat Bui","family":"Quang","sequence":"additional","affiliation":[]},{"given":"Vinh Dang","family":"Quang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,24]]},"reference":[{"key":"983_CR1","doi-asserted-by":"crossref","unstructured":"Lin, G., Wen, S., Han, Q.-L., Zhang, J., Xiang, Y.: Software vulnerability detection using deep neural networks: a survey. In: Proceedings of the IEEE, 108(10), 1825\u20131848 (2020)","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"983_CR2","unstructured":"Stubborn Weaknesses in the CWE Top 25. Accessed: 2024. [Online]."},{"key":"983_CR3","unstructured":"Open Source Security and Risk Analysis Report (OSSRA) Synopsys. https:\/\/www.blackduck.com\/resources\/analyst-reports\/open-source-security-risk-analysis.html#introMenu. Accessed: 2024. [Online]."},{"key":"983_CR4","doi-asserted-by":"crossref","unstructured":"Tian, Z., Tian, B., Lv, J., Chen, Y., Chen, L.: Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding. Exp. Syst. Appl. 238(part B). Art. no. 121865, ISSN 0957\u20134174 (2024)","DOI":"10.1016\/j.eswa.2023.121865"},{"key":"983_CR5","doi-asserted-by":"crossref","unstructured":"Lin, G. et al.: Software vulnerability discovery via learning multi-domain knowledge bases. IEEE Trans. Depend. Secure Comput. 18(5), 2469\u20132485 (2021)","DOI":"10.1109\/TDSC.2019.2954088"},{"key":"983_CR6","doi-asserted-by":"crossref","unstructured":"Xu, R., Tang, Z., Ye, G., Wang, H., Ke, X., Fang, D., Wang, Z. : Detecting code vulnerabilities by learning from large-scale open source repositories. J. Inf. Security Appl. 69, Art. no. 103293, ISSN 2214\u20132126 (2022)","DOI":"10.1016\/j.jisa.2022.103293"},{"key":"983_CR7","doi-asserted-by":"publisher","first-page":"4374","DOI":"10.1109\/TIFS.2024.3372809","volume":"19","author":"R Kande","year":"2024","unstructured":"Kande, R., et al.: (Security) assertions by large language models. IEEE Trans. Inf. Forensics Secur. 19, 4374\u20134389 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"983_CR8","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Ahmed, T., Ding, Y., Devanbu, P.T., Ray, B.: NatGen: generative pre-training by \u201cnaturalizing\u201d source code. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, , pp. 18\u201330 (2022)","DOI":"10.1145\/3540250.3549162"},{"issue":"1","key":"983_CR9","first-page":"1","volume":"21","author":"C Raffel","year":"2020","unstructured":"Raffel, C., Shazeer, N., Roberts, A., Lee, K., Narang, S., Matena, M., Zhou, Y., Li, W., Liu, P.J.: Exploring the limits of transfer learning with a unified text-to- text transformer. J. Mach. Learn. Res. 21(1), 1\u201367 (2020)","journal-title":"J. Mach. Learn. Res."},{"key":"983_CR10","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, W., Joty, S.R., Hoi, S.C.: CodeT5: identifier-aware unified pre-trained encoder-decoder models for code understanding and generation. arXiv preprint arXiv:2109.00859 (2021)","DOI":"10.18653\/v1\/2021.emnlp-main.685"},{"key":"983_CR11","doi-asserted-by":"crossref","unstructured":"Feng, Z., Guo, D., Tang, D., Duan, N., Feng, X., Gong, M., Shou, L., Liu, T., Jiang, D., Zhou, M.: CodeBERT: A Pre-Trained Model for Programming and Natural Languages (2020)","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"issue":"3","key":"983_CR12","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1109\/TNNLS.2020.2979800","volume":"32","author":"N Zheng","year":"2021","unstructured":"Zheng, N., Ding, J., Chai, T.: DMGAN: adversarial learning-based decision making for human-level plant-wide operation of process industries under uncertainties. IEEE Trans. Neural Netw. Learn. Syst. 32(3), 985\u2013998 (2021)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"983_CR13","unstructured":"Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., Levy, O., Lewis, M., Zettlemoyer, L., Stoyanov, V.: RoBERTa: A robustly optimized BERT pretraining approach. arXiv:1907.11692 (2019)"},{"key":"983_CR14","doi-asserted-by":"crossref","unstructured":"Koschke, R., Falke, R., Frenzel, P.: Clone detection using abstract syntax suffix trees. In: Proceedings of the 13th Working Conference on Reverse Engineering, Benevento, Italy, pp. 253\u2013262 (2006)","DOI":"10.1109\/WCRE.2006.18"},{"key":"983_CR15","doi-asserted-by":"crossref","unstructured":"Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: Proceedings of the 2014 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp. 590\u2013604 (2014)","DOI":"10.1109\/SP.2014.44"},{"key":"983_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2024.112031","volume":"212","author":"G Lu","year":"2024","unstructured":"Lu, G., Ju, X., Chen, X., Pei, W., Cai, Z.: GRACE: Empowering LLM-based software vulnerability detection with graph structure and in-context learning. J. Syst. Softw. 212, 112031. ISSN 0164\u20131212 (2024)","journal-title":"J. Syst. Softw."},{"issue":"6","key":"983_CR17","doi-asserted-by":"publisher","first-page":"1548","DOI":"10.1109\/TSE.2024.3392499","volume":"50","author":"Z Liu","year":"2024","unstructured":"Liu, Z., Tang, Y., Luo, X., Zhou, Y., Zhang, L.F.: No need to lift a finger anymore? Assessing the quality of code generation by ChatGPT. IEEE Trans. Software Eng. 50(6), 1548\u20131584 (2024)","journal-title":"IEEE Trans. Software Eng."},{"key":"983_CR18","doi-asserted-by":"crossref","unstructured":"Chen, Y., Ding, Z., Alowain, L., Chen, X., Wagner, D.: DiverseVul: a new vulnerable source code dataset for deep learning based vulnerability detection. In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses (RAID \u201923), Association for Computing Machinery, New York, NY, USA, pp. 654\u2013668 (2023)","DOI":"10.1145\/3607199.3607242"},{"key":"983_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s13735-024-00334-8","volume":"13","author":"P Kumar","year":"2024","unstructured":"Kumar, P.: Adversarial attacks and defenses for large language models (LLMs): methods, frameworks and challenges. Int. J. Multimed. Info. Retr. 13, 26 (2024)","journal-title":"Int. J. Multimed. Info. Retr."},{"key":"983_CR20","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1109\/TMLCN.2024.3395419","volume":"2","author":"MF Saiyedand","year":"2024","unstructured":"Saiyedand, M.F., Al-Anbagi, I.: Deep ensemble learning with pruning for DDoS attack detection in IoT networks. IEEE Trans. Mach. Learn. Commun. Netw. 2, 596\u2013616 (2024)","journal-title":"IEEE Trans. Mach. Learn. Commun. Netw."},{"issue":"6","key":"983_CR21","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.001.2200535","volume":"61","author":"N Bugshan","year":"2023","unstructured":"Bugshan, N., Khalil, I., Kalapaaking, A.P., Atiquzzaman, M.: Intrusion detection-based ensemble learning and microservices for zero touch networks. IEEE Commun. Mag. 61(6), 86\u201392 (2023)","journal-title":"IEEE Commun. Mag."},{"key":"983_CR22","doi-asserted-by":"crossref","unstructured":"Do Xuan, C., Cong, B.V.: An advanced computing approach for software vulnerability detection. Multimed. Tools Appl. (2024)","DOI":"10.1007\/s11042-024-19682-y"},{"key":"983_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103787","volume":"140","author":"L Kong","year":"2024","unstructured":"Kong, L., Luo, S., Pan, L., Wu, Z., Li, X.: A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement. Comput. Secur. 140, 103787 (2024)","journal-title":"Comput. Secur."},{"issue":"13","key":"983_CR24","doi-asserted-by":"publisher","first-page":"11888","DOI":"10.1109\/JIOT.2023.3244810","volume":"10","author":"A Thakkar","year":"2023","unstructured":"Thakkar, A., Lohiya, R.: Attack classification of imbalanced intrusion data for IoT network using ensemble-learning-based deep neural network. IEEE Internet of Things J. 10(13), 11888\u201311895 (2023)","journal-title":"IEEE Internet of Things J."},{"key":"983_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111623","volume":"199","author":"W Tang","year":"2023","unstructured":"Tang, W., Tang, M., Ban, M., Zhao, Z., Feng, M.: CSGVD: A deep learning approach combining sequence and graph embedding for source code vulnerability detection. J. Syst. Softw. 199, 111623 (2023)","journal-title":"J. Syst. Softw."},{"key":"983_CR26","doi-asserted-by":"crossref","unstructured":"Cheng, X., Nie, X., Li, N., Wang, H., Zheng, Z., Sui, Y.: How about bug-triggering paths?\u2014understanding and characterizing learning-based vulnerability detectors. IEEE Trans. Dependable Sec. Comput., 21(2), 542\u2013558 (2024)","DOI":"10.1109\/TDSC.2022.3192419"},{"key":"983_CR27","doi-asserted-by":"publisher","first-page":"1943","DOI":"10.1109\/TIFS.2020.3044773","volume":"16","author":"H Wang","year":"2021","unstructured":"Wang, H., et al.: Combining graph-based learning with automated data collection for code vulnerability detection. IEEE Trans. Inf. Forensics Security 16, 1943\u20131958 (2021)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"issue":"3","key":"983_CR28","doi-asserted-by":"publisher","first-page":"4953","DOI":"10.1109\/TII.2023.3329670","volume":"20","author":"W Li","year":"2024","unstructured":"Li, W., Dou, S., Wu, Y., Li, C., Liu, Y.: COCL: an intelligent framework for enhancing deep learning- based vulnerability detection. IEEE Trans. Ind. Informat. 20(3), 4953\u20134961 (2024)","journal-title":"IEEE Trans. Ind. Informat."},{"key":"983_CR29","doi-asserted-by":"crossref","unstructured":"J. Wang, H.X., Zhong, S., Xiao, Y.: DeepVulSeeker: a novel vulnerability identification framework via code graph structure and pre-training mechanism. Future Gener. Comput. Syst., 148, pp. 15\u201326 (2023)","DOI":"10.1016\/j.future.2023.05.016"},{"key":"983_CR30","unstructured":"Vaswani, A.,  Shazeer, N.,  Parmar, N.,  Uszkoreit, J.,  Jones, L.,  Gomez, A.N.,  Kaiser, \u0141.,  Polosukhin, I.: Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems  (NIPS\u201917), Curran Associates Inc., Red Hook, NY, USA, 2017, pp. 6000\u20136010."},{"key":"983_CR31","doi-asserted-by":"crossref","unstructured":"Cheng, X.,  Wang, H.,  Hua, J.,  Xu, G.,  Sui, Y.: DeepWukong: statically detecting software vulnerabilities using deep graph neural network. ACM Trans. Softw. Eng. Methodol., 30(3). Art. 38 (2021)","DOI":"10.1145\/3436877"},{"key":"983_CR32","doi-asserted-by":"crossref","unstructured":"Fu, M.,  Tantithamthavorn, C.; LineVul: a transformer-based line-level vulnerability prediction. In: 2022 IEEE\/ACM 19th International Conference on Mining Software Repositories (MSR), Pittsburgh, PA, USA, pp. 608\u2013620 (2022)","DOI":"10.1145\/3524842.3528452"},{"key":"983_CR33","doi-asserted-by":"crossref","unstructured":"Li, Y., Wang, S.,  Nguyen, T.N.: Vulnerability detection with fine-grained interpretations. In: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE 2021), Association for Computing Machinery, New York, NY, USA, pp. 292\u2013303 (2021)","DOI":"10.1145\/3468264.3468597"},{"key":"983_CR34","doi-asserted-by":"crossref","unstructured":"Guo, D., Lu, S., Duan, N., Wang, Y., Zhou, M., Yin, J.: UniXcoder: unified cross-modal pre-training for code representation. In: Annual Meeting of the Association for Computational Linguistics (ACL 2022)","DOI":"10.18653\/v1\/2022.acl-long.499"},{"key":"983_CR35","doi-asserted-by":"crossref","unstructured":"Yang, Z, Zhao, Z., Wang, C., Shi, J., Kim, D., Han, D., Lo, D.: Unveiling memorization in code models. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering (ICSE 2024), pp. 1\u201313 (2024)","DOI":"10.1145\/3597503.3639074"},{"key":"983_CR36","doi-asserted-by":"crossref","unstructured":"Wang, Y., Le, H., Gotmare, A.D.,  Bui, N.D.Q., Li, J.,  Hoi, S.C.H.: CodeT5+: open code large language models for code understanding and generation. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP 2023), (2023)","DOI":"10.18653\/v1\/2023.emnlp-main.68"},{"key":"983_CR37","doi-asserted-by":"crossref","unstructured":"Croft, R.,  Babar, M.A.,  Kholoosi, M.M.: Data quality for software vulnerability datasets. In: Proceedings of the IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 121\u2013133 (2023)","DOI":"10.1109\/ICSE48619.2023.00022"},{"key":"983_CR38","doi-asserted-by":"publisher","first-page":"3986","DOI":"10.1109\/TIFS.2024.3374219","volume":"19","author":"T Wu","year":"2024","unstructured":"Wu, T., Chen, L., Du, G., Meng, D., Shi, G.: UltraVCS: ultra-fine-grained variable-based code slicing for automated vulnerability detection. IEEE Trans. Inf. Forensics Secur. 19, 3986\u20134000 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"983_CR39","doi-asserted-by":"crossref","unstructured":"Cao, Y.,  Jiang, F..  Xiao, J.,  Chen, S.,  Shao, X.,  Wu, C.: SCcheck: a novel graph-driven and attention-enabled smart contract vulnerability detection framework for web 3.0 ecosystem. IEEE Trans. Netw. Sci. Eng. 11(5), 4007\u20134019","DOI":"10.1109\/TNSE.2023.3324942"},{"issue":"7","key":"983_CR40","first-page":"1329","volume":"28","author":"S Liu","year":"2020","unstructured":"Liu, S., Lin, G., Han, Q.-L., Wen, S., Zhang, J., Xiang, Y.: DeepBalance: deep-learning and fuzzy oversampling for vulnerability detection. IEEE Trans. Fuzzy Syst. 28(7), 1329\u20131343 (2020)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"983_CR41","doi-asserted-by":"publisher","first-page":"4043","DOI":"10.1109\/TIFS.2024.3374558","volume":"19","author":"B Ahmad","year":"2024","unstructured":"Ahmad, B., Thakur, S., Tan, B., Karri, R., Pearce, H.: On hardware security bug code fixes by prompting large language models. IEEE Trans. Inf. Forensics Secur. 19, 4043\u20134057 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"983_CR42","doi-asserted-by":"crossref","unstructured":"Yi, X.,  Wu, J.,  Li, G.,  Bashir, A.K.,  Li, J.,  AlZubi, A.A.; Recurrent semantic learning-driven fast binary vulnerability detection in healthcare cyber physical systems. IEEE Trans. Netw. Sci. Eng. 10(5), 2537\u20132550","DOI":"10.1109\/TNSE.2022.3199990"},{"key":"983_CR43","doi-asserted-by":"crossref","unstructured":"Zhang, Y.  et al., An efficient smart contract vulnerability detector based on semantic contract graphs using approximate graph matching. IEEE Internet Things J. 10(24), 21431\u201321442  (2023)","DOI":"10.1109\/JIOT.2023.3294496"},{"key":"983_CR44","doi-asserted-by":"crossref","unstructured":"Fan, J.,  Li, Y.,  Wang, S.,  Nguyen, T.N.: A C\/C++ code vulnerability dataset with code changes and CVE summaries. In: Proceedings of the 17th International Conference on Mining Software Repositories (MSR \u201920), New York, NY, USA, pp. 508\u2013512 (2020)","DOI":"10.1145\/3379597.3387501"},{"issue":"9","key":"983_CR45","doi-asserted-by":"publisher","first-page":"3280","DOI":"10.1109\/TSE.2021.3087402","volume":"48","author":"S Chakraborty","year":"2022","unstructured":"Chakraborty, S., Krishna, R., Ding, Y., Ray, B.: Deep learning based vulnerability detection: Are we there yet? IEEE Trans. Software Eng. 48(9), 3280\u20133296 (2022)","journal-title":"IEEE Trans. Software Eng."},{"issue":"8","key":"983_CR46","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1109\/TSE.2024.3423712","volume":"50","author":"P Chakraborty","year":"2024","unstructured":"Chakraborty, P., Arumugam, K.K., Alfadel, M., Nagappan, M., McIntosh, S.: Revisiting the performance of deep learning-based vulnerability detection on realistic datasets. IEEE Trans. Software Eng. 50(8), 2163\u20132177 (2024)","journal-title":"IEEE Trans. Software Eng."},{"key":"983_CR47","unstructured":"Zhou, Y.,  Liu, S.,  Siow, J.,  Du, X.,  Liu, Y.: Devign: effective vulnerability identification by learning comprehensive program semantics via graph neural networks. In: Proceedings of the 33rd International Conference on Neural Information Processing Systems, Curran Associates Inc., Red Hook, NY, USA, 2019, Article 915, pp. 10197\u201310207 (2019)"},{"issue":"3","key":"983_CR48","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1109\/TSE.2023.3340267","volume":"50","author":"X-C Wen","year":"2024","unstructured":"Wen, X.-C., et al.: Meta-path based attentional graph learning model for vulnerability detection. IEEE Trans. Software Eng. 50(3), 360\u2013375 (2024)","journal-title":"IEEE Trans. Software Eng."},{"issue":"6","key":"983_CR49","doi-asserted-by":"publisher","first-page":"1325","DOI":"10.1109\/TSE.2024.3382361","volume":"50","author":"X-C Wen","year":"2024","unstructured":"Wen, X.-C., Gao, C., Luo, F., Wang, H., Li, G., Liao, Q.: LIVABLE: exploring long-tailed classification of software vulnerability types. IEEE Trans. Software Eng. 50(6), 1325\u20131339 (2024)","journal-title":"IEEE Trans. Software Eng."},{"key":"983_CR50","doi-asserted-by":"crossref","unstructured":"Li, Z.,  Zou, D.,  Xu, S.,  Jin, H.,  Zhu, Y.,  Chen, Z.: SySeVR: a framework for using deep learning to detect aoftware vulnerabilities. IEEE Trans. Dependable Secure Comput. 19(4), pp. 2244\u20132258 (2022)","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"983_CR51","doi-asserted-by":"crossref","unstructured":"Wen, X.-C.,  Chen, Y.,  Gao, C.,  Zhang, H.,  Zhang, J.M., Liao, Q.: Vulnerability detection with graph simplification and enhanced graph representation learning. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), Melbourne, Australia, pp. 2275\u2013228 (2023)","DOI":"10.1109\/ICSE48619.2023.00191"},{"issue":"8","key":"983_CR52","doi-asserted-by":"publisher","first-page":"4196","DOI":"10.1109\/TSE.2023.3286586","volume":"49","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Liu, Z., Hu, X., Xia, X., Li, S.: Vulnerability detection by learning from syntax-based execution paths of code. IEEE Trans. Software Eng. 49(8), 4196\u20134212 (2023)","journal-title":"IEEE Trans. Software Eng."},{"key":"983_CR53","doi-asserted-by":"crossref","unstructured":"Verdi, M.,  Sami, A.,  Akhondali, J.,  Khomh, F.,  Uddin, G.,  Motlagh, A.K.; An empirical study of C++ vulnerabilities in crowd-sourced code examples. IEEE Trans. Softw. Eng. 48(5), pp. 1497\u20131514 (2022)","DOI":"10.1109\/TSE.2020.3023664"},{"key":"983_CR54","unstructured":"Zhang, D.,  Ahmad, W.U.,  Tan, M.,  Ding, H.,  Nallapati, R.,  Roth, D.,  Ma, X.,  Xiang, B.; Code representation learning at scale. In: The Twelfth International Conference on Learning Representations. Vienna Austria, (2024)"},{"key":"983_CR55","doi-asserted-by":"publisher","unstructured":"Cong, B.V., Xuan, C.D.: A new framework for software vulnerability detection based on an advanced computing. Comput. Mater. Continua 79(3), 3699\u20133723 (2024). https:\/\/doi.org\/10.32604\/cmc.2024.050019","DOI":"10.32604\/cmc.2024.050019"},{"key":"983_CR56","doi-asserted-by":"publisher","first-page":"17042","DOI":"10.1007\/s11227-023-05282-4","volume":"79","author":"C Do Xuan","year":"2023","unstructured":"Do Xuan, C., Mai, D.H., Thanh, M.C., et al.: A novel approach for software vulnerability detection based on intelligent cognitive computing. J. Supercomput. 79, 17042\u201317078 (2023). https:\/\/doi.org\/10.1007\/s11227-023-05282-4","journal-title":"J. Supercomput."},{"key":"983_CR57","doi-asserted-by":"publisher","unstructured":"Xuan, C.D.: A new approach to software vulnerability detection based on CPG analysis. Cogent Eng., 10(1) (2023). https:\/\/doi.org\/10.1080\/23311916.2023.2221962.","DOI":"10.1080\/23311916.2023.2221962"},{"key":"983_CR58","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/s10515-024-00440-1","volume":"31","author":"CX Do","year":"2024","unstructured":"Do, C.X., Luu, N.T., Nguyen, P.T.L.: Optimizing software vulnerability detection using RoBERTa and machine learning. Autom. Softw. Eng. 31, 40 (2024). https:\/\/doi.org\/10.1007\/s10515-024-00440-1","journal-title":"Autom. Softw. Eng."},{"issue":"1","key":"983_CR59","doi-asserted-by":"publisher","first-page":"70","DOI":"10.5614\/itbj.ict.res.appl.2022.16.1.5","volume":"16","author":"DX Cho","year":"2022","unstructured":"Cho, D.X., Son, V.N., Duc, D.: Automatically detect software security vulnerabilities based on natural language processing techniques and machine learning algorithms. J. ICT Res. Appl. 16(1), 70\u201387 (2022). https:\/\/doi.org\/10.5614\/itbj.ict.res.appl.2022.16.1.5","journal-title":"J. ICT Res. Appl."},{"key":"983_CR60","doi-asserted-by":"publisher","unstructured":"Bui, V.-C.,  Do, X.-C.: Detecting software vulnerabilities based on source code analysis using GCN transformer. In;  2023 RIVF International Conference on Computing and Communication Technologies (RIVF), Hanoi, Vietnam, pp. 112\u2013117 (2023).  https:\/\/doi.org\/10.1109\/RIVF60135.2023.10471834.","DOI":"10.1109\/RIVF60135.2023.10471834"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-00983-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-00983-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-00983-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:21:21Z","timestamp":1739337681000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-00983-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,24]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["983"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-00983-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,24]]},"assertion":[{"value":"7 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We wish to confirm that there are no known conflicts of interest associated with this publication and there has been no significant financial support for this work that could have influenced its outcome.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"69"}}