Vulnerability detection method and device based on context semantics
A vulnerability detection and context technology, applied in the field of information security applications, can solve the problem of high training cost, and achieve the effect of improving accuracy performance, improving effect, and improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings.
[0033] The overall process of the vulnerability detection method based on context semantics is as follows: figure 1 As shown, it mainly includes the following steps: (1) symbolize the obtained code segment, and convert the vulnerability characteristics of each code segment into a specific symbolic representation, wherein the same feature is mapped to the same symbolic representation; (2) ) symbol representation is converted into a vector; (3) vector input is based on the source code vulnerability detection model of ELM, and the vulnerability detection is carried out, and the source code vulnerability detection model based on ELM is trained using the training data set in advance, and the model includes an input layer , hidden layer and output layer.
[0034] In the following description, electric power information system, power grid informati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


