Found: 260
Select item for more details and to access through your institution.
HotCFuzz: Enhancing Vulnerability Detection through Fuzzing and Hotspot Code Coverage Analysis.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 10, p. 1909, doi. 10.3390/electronics13101909
- By:
- Publication type:
- Article
Design and evaluation of highly accurate smart contract code vulnerability detection framework.
- Published in:
- Data Mining & Knowledge Discovery, 2024, v. 38, n. 3, p. 888, doi. 10.1007/s10618-023-00981-1
- By:
- Publication type:
- Article
Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 4, p. 214, doi. 10.3390/info15040214
- By:
- Publication type:
- Article
There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability Detection †.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 4, p. 216, doi. 10.3390/info15040216
- By:
- Publication type:
- Article
Security bug reports classification using fasttext.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1347, doi. 10.1007/s10207-023-00793-w
- By:
- Publication type:
- Article
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.
- Published in:
- Scientific Reports, 2024, v. 14, p. 1, doi. 10.1038/s41598-024-56871-z
- By:
- Publication type:
- Article
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis.
- Published in:
- Computers, Materials & Continua, 2024, v. 78, n. 3, p. 3867, doi. 10.32604/cmc.2024.046871
- By:
- Publication type:
- Article
INTELLIGENT DETECTION AND ANALYSIS OF SOFTWARE VULNERABILITIES BASED ON ENCRYPTION ALGORITHMS AND FEATURE EXTRACTION.
- Published in:
- Scalable Computing: Practice & Experience, 2024, v. 25, n. 2, p. 900, doi. 10.12694/scpe.v25i2.2587
- By:
- Publication type:
- Article
Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model.
- Published in:
- Journal of Engineering (2314-4912), 2024, v. 2024, p. 1, doi. 10.1155/2024/9962691
- By:
- Publication type:
- Article
Enhancing attack resilience of cyber-physical systems through state dependency graph models.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 1, p. 187, doi. 10.1007/s10207-023-00731-w
- By:
- Publication type:
- Article
Estimating vulnerability metrics with word embedding and multiclass classification methods.
- Published in:
- International Journal of Information Security, 2024, v. 23, n. 1, p. 247, doi. 10.1007/s10207-023-00734-7
- By:
- Publication type:
- Article
CIBERSEGURIDAD PARA ESCÉPTICOS.
- Published in:
- Debates IESA, 2024, v. 68, n. 1, p. 37
- By:
- Publication type:
- Article
CODESENTRY: REVOLUTIONIZING REAL-TIME SOFTWARE VULNERABILITY DETECTION WITH OPTIMIZED GPT FRAMEWORK.
- Published in:
- Revista Academiei Fortelor Terestre, 2024, v. 29, n. 1, p. 98, doi. 10.2478/raft-2024-0010
- By:
- Publication type:
- Article
CODEGUARD: UTILIZING ADVANCED PATTERN RECOGNITION IN LANGUAGE MODELS FOR SOFTWARE VULNERABILITY ANALYSIS.
- Published in:
- Revista Academiei Fortelor Terestre, 2024, v. 29, n. 1, p. 108, doi. 10.2478/raft-2024-0011
- By:
- Publication type:
- Article
A competitive analysis of software quality investment with technology diversification and security concern.
- Published in:
- Electronic Commerce Research, 2023, v. 23, n. 4, p. 2691, doi. 10.1007/s10660-022-09558-4
- By:
- Publication type:
- Article
Fine-Grained Modeling of ROP Vulnerability Exploitation Process under Stack Overflow Based on Petri Nets.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 23, p. 4741, doi. 10.3390/electronics12234741
- By:
- Publication type:
- Article
OPEN-SOURCE AND CLOSED-SOURCE PROJECTS: A FAIR COMPARISON.
- Published in:
- Journal of Information Systems & Operations Management, 2023, v. 17, n. 2, p. 1
- By:
- Publication type:
- Article
Cybersecurity vulnerability analysis of medical devices purchased by national health services.
- Published in:
- Scientific Reports, 2023, v. 13, n. 1, p. 1, doi. 10.1038/s41598-023-45927-1
- By:
- Publication type:
- Article
Cyber Insurance 101: Coverage Options and Provider Expectations.
- Published in:
- CPA Journal, 2023, v. 93, n. 11/12, p. 16
- By:
- Publication type:
- Article
Deep Reinforcement Learning-Driven Mitigation of Adverse Effects of Cyber-Attacks on Electric Vehicle Charging Station.
- Published in:
- Energies (19961073), 2023, v. 16, n. 21, p. 7296, doi. 10.3390/en16217296
- By:
- Publication type:
- Article
An empirical evaluation of deep learning‐based source code vulnerability detection: Representation versus models.
- Published in:
- Journal of Software: Evolution & Process, 2023, v. 35, n. 11, p. 1, doi. 10.1002/smr.2422
- By:
- Publication type:
- Article
An empirical analysis for software robustness vulnerability in terms of modularity quality.
- Published in:
- Systems Engineering, 2023, v. 26, n. 6, p. 754, doi. 10.1002/sys.21686
- By:
- Publication type:
- Article
Improved Path Testing Using Multi-Verse Optimization Algorithm and the Integration of Test Path Distance.
- Published in:
- International Journal of Interactive Mobile Technologies, 2023, v. 17, n. 20, p. 38, doi. 10.3991/ijim.v17i20.37517
- By:
- Publication type:
- Article
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 5, p. 1277, doi. 10.1007/s10207-023-00691-1
- By:
- Publication type:
- Article
A novel approach for software vulnerability detection based on intelligent cognitive computing.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 15, p. 17042, doi. 10.1007/s11227-023-05282-4
- By:
- Publication type:
- Article
Enhancing Security and Sustainability of e-Learning Software Systems: A Comprehensive Vulnerability Analysis and Recommendations for Stakeholders.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 19, p. 14132, doi. 10.3390/su151914132
- By:
- Publication type:
- Article
DEVELOPMENT OF AN ALGORITHM FOR CODE CLONE DETECTION IN SOURCE CODE BASED ON ABSTRACT SYNTAX TREE.
- Published in:
- Technology Audit & Production Reserves, 2023, v. 4, n. 2(72), p. 33, doi. 10.15587/2706-5448.2023.286472
- By:
- Publication type:
- Article
Plant Cybersecurity Awareness.
- Published in:
- Chemical Engineering, 2023, v. 130, n. 9, p. 21
- Publication type:
- Article
An Exploratory Study Gathering Security Requirements for the Software Development Process.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 17, p. 3594, doi. 10.3390/electronics12173594
- By:
- Publication type:
- Article
An Analytical Review of the Source Code Models for Exploit Analysis.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 9, p. 497, doi. 10.3390/info14090497
- By:
- Publication type:
- Article
Retracted: Detection and Analysis of Man-Machine Interactive Software Vulnerabilities Based on Ultrasonic Data Acquisition and Signal Processing Algorithms.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things.
- Published in:
- Intelligent Automation & Soft Computing, 2023, v. 37, n. 2, p. 2407, doi. 10.32604/iasc.2023.039937
- By:
- Publication type:
- Article
IRC-CLVul: Cross-Programming-Language Vulnerability Detection with Intermediate Representations and Combined Features.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 14, p. 3067, doi. 10.3390/electronics12143067
- By:
- Publication type:
- Article
Static Code Analysis: A Tree of Science Review.
- Published in:
- Entre Ciencia e Ingeniería, 2023, v. 17, n. 34, p. 9, doi. 10.31908/19098367.2846
- By:
- Publication type:
- Article
A Comparison Study of Generative Adversarial Network Architectures for Malicious Cyber-Attack Data Generation.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 12, p. 7106, doi. 10.3390/app13127106
- By:
- Publication type:
- Article
BUG BOUNTY HUNTING: A CASE STUDY OF SUCCESSFUL VULNERABILITY DISCOVERY AND DISCLOSURE.
- Published in:
- Devotion: Journal of Research & Community Service, 2023, v. 4, n. 6, p. 1333, doi. 10.59188/devotion.v4i6.486
- By:
- Publication type:
- Article
An approach to modeling and simulating resiliency in multidisciplinary microservice networks.
- Published in:
- International Journal of Modeling, Simulation & Scientific Computing, 2023, v. 14, n. 3, p. 1, doi. 10.1142/S1793962323500113
- By:
- Publication type:
- Article
A Software Vulnerability Management Framework for the Minimization of System Attack Surface and Risk.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 10, p. 2278, doi. 10.3390/electronics12102278
- By:
- Publication type:
- Article
Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis.
- Published in:
- International Journal of Network Management, 2023, v. 33, n. 3, p. 1, doi. 10.1002/nem.2198
- By:
- Publication type:
- Article
TRAGEDY OF THE DIGITAL COMMONS.
- Published in:
- North Carolina Law Review, 2023, v. 101, n. 4, p. 1129
- By:
- Publication type:
- Article
The Effect of Dual Hyperparameter Optimization on Software Vulnerability Prediction Models.
- Published in:
- e-Informatica, 2023, v. 17, n. 1, p. 1, doi. 10.37190/e-Inf230102
- By:
- Publication type:
- Article
Robust Sourcing Under Multilevel Supply Risks: Analysis of Random Yield and Capacity.
- Published in:
- INFORMS Journal on Computing, 2023, v. 35, n. 1, p. 178, doi. 10.1287/ijoc.2022.1254
- By:
- Publication type:
- Article
Integration of Effort: Securing Critical Infrastructure from Cyberattack.
- Published in:
- Public Administration Review, 2022, v. 82, n. 4, p. 771, doi. 10.1111/puar.13493
- By:
- Publication type:
- Article
A Link Fabrication Attack Mitigation Approach (LiFAMA) for Software Defined Networks.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 10, p. N.PAG, doi. 10.3390/electronics11101581
- By:
- Publication type:
- Article
Implementation of Novel Cryptographic Techniques for Mitigating Security Attacks in Iot.
- Published in:
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 1929
- By:
- Publication type:
- Article
What is Log4j? The Latest Internet Vulnerability.
- Published in:
- CounterPunch, 2021, p. 1
- By:
- Publication type:
- Article
Searching Deterministic Chaotic Properties in System-Wide Vulnerability Datasets.
- Published in:
- Informatics, 2021, v. 8, n. 4, p. 86, doi. 10.3390/informatics8040086
- By:
- Publication type:
- Article
An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.
- Published in:
- Sensors (14248220), 2021, v. 21, n. 12, p. 4220, doi. 10.3390/s21124220
- By:
- Publication type:
- Article
An analysis of security vulnerabilities in container images for scientific data analysis.
- Published in:
- GigaScience, 2021, v. 10, n. 6, p. 1, doi. 10.1093/gigascience/giab025
- By:
- Publication type:
- Article
Modeling Software Vulnerability Discovery Process Inculcating the Impact of Reporters.
- Published in:
- Information Systems Frontiers, 2021, v. 23, n. 3, p. 709, doi. 10.1007/s10796-020-10004-9
- By:
- Publication type:
- Article