{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:45:23Z","timestamp":1777657523192,"version":"3.51.4"},"reference-count":69,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3396410","type":"journal-article","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T17:28:23Z","timestamp":1714670903000},"page":"64446-64460","source":"Crossref","is-referenced-by-count":21,"title":["DB-CBIL: A DistilBert-Based Transformer Hybrid Model Using CNN and BiLSTM for Software Vulnerability Detection"],"prefix":"10.1109","volume":"12","author":[{"given":"Ahmed","family":"Bahaa","sequence":"first","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5936-5177","authenticated-orcid":false,"given":"Aya El-Rahman","family":"Kamal","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7247-4825","authenticated-orcid":false,"given":"Hanan","family":"Fahmy","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3522-4875","authenticated-orcid":false,"given":"Amr S.","family":"Ghoneim","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Computers and Artificial Intelligence, Helwan University, Helwan, Egypt"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"CVE","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2340398"},{"key":"ref3","volume-title":"Checkmarx","year":"2023"},{"key":"ref4","volume-title":"Flawfinder","year":"2023"},{"key":"ref5","volume-title":"Rats: A Rough Auditing Tool for Security","year":"2023"},{"key":"ref6","volume-title":"CPPCheck","year":"2023"},{"key":"ref7","first-page":"1","article-title":"A systematic literature review on software vulnerability detection using machine learning approaches","volume":"4","author":"Farid","year":"2022","journal-title":"FCI-H Inform. Bull."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00188"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3087402"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3051525"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"ref13","first-page":"10197","article-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","author":"Zhou"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1310.4546"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K16-1006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2821768"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N18-1202"},{"key":"ref21","article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proc. Conf. North Amer. Chapter Assoc. Comput. Linguistics, Human Language Technol.","author":"Devlin"},{"issue":"8","key":"ref22","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06791-4_4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892280"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW55968.2022.00042"},{"key":"ref26","volume-title":"Software Assurance Reference Dataset","year":"2018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1404.7828"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.739"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.14"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/sym14112308"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/app13084921"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2856821"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2969705"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2453359"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2795041"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8297014"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2015.2400218"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74695-9_23"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.repl4nlp-1.15"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref44","article-title":"DistilBERT, a distilled version of BERT: Smaller, faster, cheaper and lighter","author":"Sanh","year":"2019","journal-title":"arXiv:1910.01108"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1503.02531"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991102"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774504"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414065"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2019.07.05"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516665"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831723"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421003"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.54"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857720"},{"key":"ref58","article-title":"Automated software vulnerability detection with machine learning","author":"Harer","year":"2018","journal-title":"arXiv:1803.04497"},{"key":"ref59","first-page":"13","article-title":"Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning","volume-title":"Proc. 5th USENIX Conf. Offensive Technol.","author":"Yamaguchi"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988557"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468597"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3138840"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2923227"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1907.11692"},{"key":"ref65","volume-title":"DB-CBIL Model","year":"2023"},{"key":"ref66","volume-title":"ANTLR","year":"2023"},{"key":"ref67","volume-title":"Code Sensor ANTLR Parser","year":"2023"},{"key":"ref68","volume-title":"DB-CBIL-Dataset","year":"2023"},{"key":"ref69","volume-title":"TensorFlow","year":"2023"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10517582.pdf?arnumber=10517582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T17:30:28Z","timestamp":1715362228000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10517582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3396410","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}