Vulnerability Detection Methods Research Articles