PrAIoritize: Automated Early Prediction and Prioritization of Vulnerabilities in Smart Contracts Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2308.11082
Context:Smart contracts are prone to numerous security threats due to undisclosed vulnerabilities and code weaknesses. In Ethereum smart contracts, the challenges of timely addressing these code weaknesses highlight the critical need for automated early prediction and prioritization during the code review process. Efficient prioritization is crucial for smart contract security. Objective:Toward this end, our research aims to provide an automated approach, PrAIoritize, for prioritizing and predicting critical code weaknesses in Ethereum smart contracts during the code review process. Method: To do so, we collected smart contract code reviews sourced from Open Source Software (OSS) on GitHub and the Common Vulnerabilities and Exposures (CVE) database. Subsequently, we developed PrAIoritize, an innovative automated prioritization approach. PrAIoritize integrates advanced Large Language Models (LLMs) with sophisticated natural language processing (NLP) techniques. PrAIoritize automates code review labeling by employing a domain-specific lexicon of smart contract weaknesses and their impacts. Following this, feature engineering is conducted for code reviews, and a pre-trained DistilBERT model is utilized for priority classification. Finally, the model is trained and evaluated using code reviews of smart contracts. Results: Our evaluation demonstrates significant improvement over state-of-the-art baselines and commonly used pre-trained models (e.g. T5) for similar classification tasks, with 4.82\%-27.94\% increase in F-measure, precision, and recall. Conclusion: By leveraging PrAIoritize, practitioners can efficiently prioritize smart contract code weaknesses, addressing critical code weaknesses promptly and reducing the time and effort required for manual triage.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2308.11082
- https://arxiv.org/pdf/2308.11082
- OA Status
- green
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4386113912
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4386113912Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2308.11082Digital Object Identifier
- Title
-
PrAIoritize: Automated Early Prediction and Prioritization of Vulnerabilities in Smart ContractsWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-08-21Full publication date if available
- Authors
-
Majd Soud, Grischa Liebel, Mohammad HamdaqaList of authors in order
- Landing page
-
https://arxiv.org/abs/2308.11082Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2308.11082Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2308.11082Direct OA link when available
- Concepts
-
Computer science, Feature engineering, Smart contract, Key (lock), Software bug, Software, Vulnerability (computing), Computer security, Lexicon, Security bug, Task (project management), Artificial intelligence, Software engineering, Deep learning, Engineering, Information security, Software security assurance, Programming language, Systems engineering, Security service, BlockchainTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4386113912 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2308.11082 |
| ids.doi | https://doi.org/10.48550/arxiv.2308.11082 |
| ids.openalex | https://openalex.org/W4386113912 |
| fwci | |
| type | preprint |
| title | PrAIoritize: Automated Early Prediction and Prioritization of Vulnerabilities in Smart Contracts |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10260 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9987000226974487 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Software Engineering Research |
| topics[1].id | https://openalex.org/T12479 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9934999942779541 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1710 |
| topics[1].subfield.display_name | Information Systems |
| topics[1].display_name | Web Application Security Vulnerabilities |
| topics[2].id | https://openalex.org/T10734 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9884999990463257 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Information and Cyber Security |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.7624874114990234 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C2778827112 |
| concepts[1].level | 3 |
| concepts[1].score | 0.5789192318916321 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q22245680 |
| concepts[1].display_name | Feature engineering |
| concepts[2].id | https://openalex.org/C2779950589 |
| concepts[2].level | 3 |
| concepts[2].score | 0.5646771192550659 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q7544035 |
| concepts[2].display_name | Smart contract |
| concepts[3].id | https://openalex.org/C26517878 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5414090752601624 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q228039 |
| concepts[3].display_name | Key (lock) |
| concepts[4].id | https://openalex.org/C1009929 |
| concepts[4].level | 3 |
| concepts[4].score | 0.48615047335624695 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q179550 |
| concepts[4].display_name | Software bug |
| concepts[5].id | https://openalex.org/C2777904410 |
| concepts[5].level | 2 |
| concepts[5].score | 0.48048821091651917 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q7397 |
| concepts[5].display_name | Software |
| concepts[6].id | https://openalex.org/C95713431 |
| concepts[6].level | 2 |
| concepts[6].score | 0.47678613662719727 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q631425 |
| concepts[6].display_name | Vulnerability (computing) |
| concepts[7].id | https://openalex.org/C38652104 |
| concepts[7].level | 1 |
| concepts[7].score | 0.4608241319656372 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[7].display_name | Computer security |
| concepts[8].id | https://openalex.org/C2778121359 |
| concepts[8].level | 2 |
| concepts[8].score | 0.45869818329811096 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q8096 |
| concepts[8].display_name | Lexicon |
| concepts[9].id | https://openalex.org/C131275738 |
| concepts[9].level | 5 |
| concepts[9].score | 0.4541149139404297 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q7445023 |
| concepts[9].display_name | Security bug |
| concepts[10].id | https://openalex.org/C2780451532 |
| concepts[10].level | 2 |
| concepts[10].score | 0.4533329904079437 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q759676 |
| concepts[10].display_name | Task (project management) |
| concepts[11].id | https://openalex.org/C154945302 |
| concepts[11].level | 1 |
| concepts[11].score | 0.3808414936065674 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[11].display_name | Artificial intelligence |
| concepts[12].id | https://openalex.org/C115903868 |
| concepts[12].level | 1 |
| concepts[12].score | 0.34485960006713867 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q80993 |
| concepts[12].display_name | Software engineering |
| concepts[13].id | https://openalex.org/C108583219 |
| concepts[13].level | 2 |
| concepts[13].score | 0.24586522579193115 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q197536 |
| concepts[13].display_name | Deep learning |
| concepts[14].id | https://openalex.org/C127413603 |
| concepts[14].level | 0 |
| concepts[14].score | 0.1345718502998352 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[14].display_name | Engineering |
| concepts[15].id | https://openalex.org/C527648132 |
| concepts[15].level | 2 |
| concepts[15].score | 0.1006651520729065 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q189900 |
| concepts[15].display_name | Information security |
| concepts[16].id | https://openalex.org/C62913178 |
| concepts[16].level | 4 |
| concepts[16].score | 0.09787118434906006 |
| concepts[16].wikidata | https://www.wikidata.org/wiki/Q7554361 |
| concepts[16].display_name | Software security assurance |
| concepts[17].id | https://openalex.org/C199360897 |
| concepts[17].level | 1 |
| concepts[17].score | 0.0 |
| concepts[17].wikidata | https://www.wikidata.org/wiki/Q9143 |
| concepts[17].display_name | Programming language |
| concepts[18].id | https://openalex.org/C201995342 |
| concepts[18].level | 1 |
| concepts[18].score | 0.0 |
| concepts[18].wikidata | https://www.wikidata.org/wiki/Q682496 |
| concepts[18].display_name | Systems engineering |
| concepts[19].id | https://openalex.org/C29983905 |
| concepts[19].level | 3 |
| concepts[19].score | 0.0 |
| concepts[19].wikidata | https://www.wikidata.org/wiki/Q7445066 |
| concepts[19].display_name | Security service |
| concepts[20].id | https://openalex.org/C2779687700 |
| concepts[20].level | 2 |
| concepts[20].score | 0.0 |
| concepts[20].wikidata | https://www.wikidata.org/wiki/Q20514253 |
| concepts[20].display_name | Blockchain |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.7624874114990234 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/feature-engineering |
| keywords[1].score | 0.5789192318916321 |
| keywords[1].display_name | Feature engineering |
| keywords[2].id | https://openalex.org/keywords/smart-contract |
| keywords[2].score | 0.5646771192550659 |
| keywords[2].display_name | Smart contract |
| keywords[3].id | https://openalex.org/keywords/key |
| keywords[3].score | 0.5414090752601624 |
| keywords[3].display_name | Key (lock) |
| keywords[4].id | https://openalex.org/keywords/software-bug |
| keywords[4].score | 0.48615047335624695 |
| keywords[4].display_name | Software bug |
| keywords[5].id | https://openalex.org/keywords/software |
| keywords[5].score | 0.48048821091651917 |
| keywords[5].display_name | Software |
| keywords[6].id | https://openalex.org/keywords/vulnerability |
| keywords[6].score | 0.47678613662719727 |
| keywords[6].display_name | Vulnerability (computing) |
| keywords[7].id | https://openalex.org/keywords/computer-security |
| keywords[7].score | 0.4608241319656372 |
| keywords[7].display_name | Computer security |
| keywords[8].id | https://openalex.org/keywords/lexicon |
| keywords[8].score | 0.45869818329811096 |
| keywords[8].display_name | Lexicon |
| keywords[9].id | https://openalex.org/keywords/security-bug |
| keywords[9].score | 0.4541149139404297 |
| keywords[9].display_name | Security bug |
| keywords[10].id | https://openalex.org/keywords/task |
| keywords[10].score | 0.4533329904079437 |
| keywords[10].display_name | Task (project management) |
| keywords[11].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[11].score | 0.3808414936065674 |
| keywords[11].display_name | Artificial intelligence |
| keywords[12].id | https://openalex.org/keywords/software-engineering |
| keywords[12].score | 0.34485960006713867 |
| keywords[12].display_name | Software engineering |
| keywords[13].id | https://openalex.org/keywords/deep-learning |
| keywords[13].score | 0.24586522579193115 |
| keywords[13].display_name | Deep learning |
| keywords[14].id | https://openalex.org/keywords/engineering |
| keywords[14].score | 0.1345718502998352 |
| keywords[14].display_name | Engineering |
| keywords[15].id | https://openalex.org/keywords/information-security |
| keywords[15].score | 0.1006651520729065 |
| keywords[15].display_name | Information security |
| keywords[16].id | https://openalex.org/keywords/software-security-assurance |
| keywords[16].score | 0.09787118434906006 |
| keywords[16].display_name | Software security assurance |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2308.11082 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2308.11082 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2308.11082 |
| locations[1].id | doi:10.48550/arxiv.2308.11082 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2308.11082 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5059474599 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-7007-4433 |
| authorships[0].author.display_name | Majd Soud |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Soud, Majd |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5042863450 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3884-815X |
| authorships[1].author.display_name | Grischa Liebel |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Liebel, Grischa |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5042033117 |
| authorships[2].author.orcid | https://orcid.org/0000-0003-4927-2755 |
| authorships[2].author.display_name | Mohammad Hamdaqa |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Hamdaqa, Mohammad |
| authorships[2].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2308.11082 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2023-08-24T00:00:00 |
| display_name | PrAIoritize: Automated Early Prediction and Prioritization of Vulnerabilities in Smart Contracts |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T10260 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9987000226974487 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Software Engineering Research |
| related_works | https://openalex.org/W4283750846, https://openalex.org/W2007984522, https://openalex.org/W3048815537, https://openalex.org/W4306406268, https://openalex.org/W2038197060, https://openalex.org/W2808393507, https://openalex.org/W4213233191, https://openalex.org/W2186452251, https://openalex.org/W2109156518, https://openalex.org/W2514045537 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2308.11082 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2308.11082 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2308.11082 |
| primary_location.id | pmh:oai:arXiv.org:2308.11082 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2308.11082 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2308.11082 |
| publication_date | 2023-08-21 |
| publication_year | 2023 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 134, 154 |
| abstract_inverted_index.By | 205 |
| abstract_inverted_index.In | 15 |
| abstract_inverted_index.To | 79 |
| abstract_inverted_index.an | 58, 108 |
| abstract_inverted_index.by | 132 |
| abstract_inverted_index.do | 80 |
| abstract_inverted_index.in | 69, 199 |
| abstract_inverted_index.is | 44, 148, 158, 166 |
| abstract_inverted_index.of | 21, 137, 173 |
| abstract_inverted_index.on | 94 |
| abstract_inverted_index.to | 4, 9, 56 |
| abstract_inverted_index.we | 82, 105 |
| abstract_inverted_index.Our | 177 |
| abstract_inverted_index.T5) | 191 |
| abstract_inverted_index.and | 12, 35, 64, 96, 100, 141, 153, 168, 185, 202, 221, 225 |
| abstract_inverted_index.are | 2 |
| abstract_inverted_index.can | 209 |
| abstract_inverted_index.due | 8 |
| abstract_inverted_index.for | 31, 46, 62, 150, 160, 192, 228 |
| abstract_inverted_index.our | 53 |
| abstract_inverted_index.so, | 81 |
| abstract_inverted_index.the | 19, 28, 38, 74, 97, 164, 223 |
| abstract_inverted_index.Open | 90 |
| abstract_inverted_index.aims | 55 |
| abstract_inverted_index.code | 13, 25, 39, 67, 75, 86, 129, 151, 171, 214, 218 |
| abstract_inverted_index.end, | 52 |
| abstract_inverted_index.from | 89 |
| abstract_inverted_index.need | 30 |
| abstract_inverted_index.over | 182 |
| abstract_inverted_index.this | 51 |
| abstract_inverted_index.time | 224 |
| abstract_inverted_index.used | 187 |
| abstract_inverted_index.with | 120, 196 |
| abstract_inverted_index.(CVE) | 102 |
| abstract_inverted_index.(NLP) | 125 |
| abstract_inverted_index.(OSS) | 93 |
| abstract_inverted_index.(e.g. | 190 |
| abstract_inverted_index.Large | 116 |
| abstract_inverted_index.early | 33 |
| abstract_inverted_index.model | 157, 165 |
| abstract_inverted_index.prone | 3 |
| abstract_inverted_index.smart | 17, 47, 71, 84, 138, 174, 212 |
| abstract_inverted_index.their | 142 |
| abstract_inverted_index.these | 24 |
| abstract_inverted_index.this, | 145 |
| abstract_inverted_index.using | 170 |
| abstract_inverted_index.(LLMs) | 119 |
| abstract_inverted_index.Common | 98 |
| abstract_inverted_index.GitHub | 95 |
| abstract_inverted_index.Models | 118 |
| abstract_inverted_index.Source | 91 |
| abstract_inverted_index.during | 37, 73 |
| abstract_inverted_index.effort | 226 |
| abstract_inverted_index.manual | 229 |
| abstract_inverted_index.models | 189 |
| abstract_inverted_index.review | 40, 76, 130 |
| abstract_inverted_index.tasks, | 195 |
| abstract_inverted_index.timely | 22 |
| abstract_inverted_index.Method: | 78 |
| abstract_inverted_index.crucial | 45 |
| abstract_inverted_index.feature | 146 |
| abstract_inverted_index.lexicon | 136 |
| abstract_inverted_index.natural | 122 |
| abstract_inverted_index.provide | 57 |
| abstract_inverted_index.recall. | 203 |
| abstract_inverted_index.reviews | 87, 172 |
| abstract_inverted_index.similar | 193 |
| abstract_inverted_index.sourced | 88 |
| abstract_inverted_index.threats | 7 |
| abstract_inverted_index.trained | 167 |
| abstract_inverted_index.triage. | 230 |
| abstract_inverted_index.Ethereum | 16, 70 |
| abstract_inverted_index.Finally, | 163 |
| abstract_inverted_index.Language | 117 |
| abstract_inverted_index.Results: | 176 |
| abstract_inverted_index.Software | 92 |
| abstract_inverted_index.advanced | 115 |
| abstract_inverted_index.commonly | 186 |
| abstract_inverted_index.contract | 48, 85, 139, 213 |
| abstract_inverted_index.critical | 29, 66, 217 |
| abstract_inverted_index.impacts. | 143 |
| abstract_inverted_index.increase | 198 |
| abstract_inverted_index.labeling | 131 |
| abstract_inverted_index.language | 123 |
| abstract_inverted_index.numerous | 5 |
| abstract_inverted_index.priority | 161 |
| abstract_inverted_index.process. | 41, 77 |
| abstract_inverted_index.promptly | 220 |
| abstract_inverted_index.reducing | 222 |
| abstract_inverted_index.required | 227 |
| abstract_inverted_index.research | 54 |
| abstract_inverted_index.reviews, | 152 |
| abstract_inverted_index.security | 6 |
| abstract_inverted_index.utilized | 159 |
| abstract_inverted_index.Efficient | 42 |
| abstract_inverted_index.Exposures | 101 |
| abstract_inverted_index.Following | 144 |
| abstract_inverted_index.approach, | 60 |
| abstract_inverted_index.approach. | 112 |
| abstract_inverted_index.automated | 32, 59, 110 |
| abstract_inverted_index.automates | 128 |
| abstract_inverted_index.baselines | 184 |
| abstract_inverted_index.collected | 83 |
| abstract_inverted_index.conducted | 149 |
| abstract_inverted_index.contracts | 1, 72 |
| abstract_inverted_index.database. | 103 |
| abstract_inverted_index.developed | 106 |
| abstract_inverted_index.employing | 133 |
| abstract_inverted_index.evaluated | 169 |
| abstract_inverted_index.highlight | 27 |
| abstract_inverted_index.security. | 49 |
| abstract_inverted_index.DistilBERT | 156 |
| abstract_inverted_index.F-measure, | 200 |
| abstract_inverted_index.addressing | 23, 216 |
| abstract_inverted_index.challenges | 20 |
| abstract_inverted_index.contracts, | 18 |
| abstract_inverted_index.contracts. | 175 |
| abstract_inverted_index.evaluation | 178 |
| abstract_inverted_index.innovative | 109 |
| abstract_inverted_index.integrates | 114 |
| abstract_inverted_index.leveraging | 206 |
| abstract_inverted_index.precision, | 201 |
| abstract_inverted_index.predicting | 65 |
| abstract_inverted_index.prediction | 34 |
| abstract_inverted_index.prioritize | 211 |
| abstract_inverted_index.processing | 124 |
| abstract_inverted_index.weaknesses | 26, 68, 140, 219 |
| abstract_inverted_index.Conclusion: | 204 |
| abstract_inverted_index.PrAIoritize | 113, 127 |
| abstract_inverted_index.efficiently | 210 |
| abstract_inverted_index.engineering | 147 |
| abstract_inverted_index.improvement | 181 |
| abstract_inverted_index.pre-trained | 155, 188 |
| abstract_inverted_index.significant | 180 |
| abstract_inverted_index.techniques. | 126 |
| abstract_inverted_index.undisclosed | 10 |
| abstract_inverted_index.weaknesses, | 215 |
| abstract_inverted_index.weaknesses. | 14 |
| abstract_inverted_index.PrAIoritize, | 61, 107, 207 |
| abstract_inverted_index.demonstrates | 179 |
| abstract_inverted_index.prioritizing | 63 |
| abstract_inverted_index.Context:Smart | 0 |
| abstract_inverted_index.Subsequently, | 104 |
| abstract_inverted_index.practitioners | 208 |
| abstract_inverted_index.sophisticated | 121 |
| abstract_inverted_index.4.82\%-27.94\% | 197 |
| abstract_inverted_index.classification | 194 |
| abstract_inverted_index.prioritization | 36, 43, 111 |
| abstract_inverted_index.Vulnerabilities | 99 |
| abstract_inverted_index.classification. | 162 |
| abstract_inverted_index.domain-specific | 135 |
| abstract_inverted_index.vulnerabilities | 11 |
| abstract_inverted_index.Objective:Toward | 50 |
| abstract_inverted_index.state-of-the-art | 183 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 3 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/17 |
| sustainable_development_goals[0].score | 0.4099999964237213 |
| sustainable_development_goals[0].display_name | Partnerships for the goals |
| citation_normalized_percentile |