Works matching DE "COMPUTER security vulnerabilities"
Results: 309
Cybersecurity in the Dental Office: A Holistic Approach.
- Published in:
- Compendium of Continuing Education in Dentistry (15488578), 2018, v. 39, n. 6, p. 348
- By:
- Publication type:
- Article
An advanced computing approach for software vulnerability detection.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 39, p. 86707, doi. 10.1007/s11042-024-19682-y
- By:
- Publication type:
- Article
Test to Protect: The Critical Role of Quality Assurance in Cybersecurity.
- Published in:
- ISSA Journal, 2024, v. 22, n. 7, p. 23
- By:
- Publication type:
- Article
From Encryption to Social Media: The Expanding Battlefield of Cyber Extortion Tactics.
- Published in:
- ISSA Journal, 2024, v. 22, n. 4, p. 15
- By:
- Publication type:
- Article
Changing the DevOps Culture One Security Scan at a Time.
- Published in:
- ISSA Journal, 2019, v. 17, n. 11, p. 32
- By:
- Publication type:
- Article
July 2019: The Month of Privacy?
- Published in:
- ISSA Journal, 2019, v. 17, n. 9, p. 18
- By:
- Publication type:
- Article
CPU Bugs: Trading Security for Performance: Exploring the causes and long-term impact from the infamous Meltdown and Spectre vulnerabilities.
- Published in:
- ISSA Journal, 2018, v. 16, n. 2, p. 25
- By:
- Publication type:
- Article
KRACK Attack!
- Published in:
- ISSA Journal, 2017, v. 15, n. 11, p. 6
- By:
- Publication type:
- Article
The Cyber Profession at Risk: Take Control of Your Cybersecurity Career Life Cycle.
- Published in:
- ISSA Journal, 2016, v. 14, n. 10, p. 14
- By:
- Publication type:
- Article
Security's Seat at the Big Data Table.
- Published in:
- ISSA Journal, 2016, v. 14, n. 2, p. 24
- By:
- Publication type:
- Article
Oh Baby - The IoT and Security.
- Published in:
- ISSA Journal, 2016, v. 14, n. 1, p. 9
- By:
- Publication type:
- Article
Baby Steps.
- Published in:
- ISSA Journal, 2016, v. 14, n. 2, p. 7
- By:
- Publication type:
- Article
Analyze Me.
- Published in:
- ISSA Journal, 2016, v. 14, n. 2, p. 6
- By:
- Publication type:
- Article
Data Mining & Analytics...circa 1928.
- Published in:
- ISSA Journal, 2016, v. 14, n. 2, p. 5
- By:
- Publication type:
- Article
Cloud Security for a New Year.
- Published in:
- ISSA Journal, 2016, v. 14, n. 1, p. 5
- By:
- Publication type:
- Article
The Impact of Competition Intensity on Software Security: An Empirical Analysis of Web Browser Patch Releases.
- Published in:
- Review of Network Economics, 2024, v. 23, n. 4, p. 161, doi. 10.1515/rne-2024-0045
- By:
- Publication type:
- Article
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.
- Published in:
- Scientific Reports, 2024, v. 14, n. 1, p. 1, doi. 10.1038/s41598-024-56871-z
- By:
- Publication type:
- Article
Personality and Social Context Factors Associated to Self-Reported Excessive Use of Information and Communication Technology (ICT) on a Sample of Spanish Adolescents.
- Published in:
- Frontiers in Psychology, 2019, p. N.PAG, doi. 10.3389/fpsyg.2019.00436
- By:
- Publication type:
- Article
An empirical analysis for software robustness vulnerability in terms of modularity quality.
- Published in:
- Systems Engineering, 2023, v. 26, n. 6, p. 754, doi. 10.1002/sys.21686
- By:
- Publication type:
- Article
Vulnerabilities in the internet of things.
- Published in:
- Visión Electrónica, 2019, v. 13, n. 2, p. 1
- By:
- Publication type:
- Article
Behind the Code: Identifying Zero-Day Exploits in WordPress.
- Published in:
- Future Internet, 2024, v. 16, n. 7, p. 256, doi. 10.3390/fi16070256
- By:
- Publication type:
- Article
DeepDiver: Diving into Abysmal Depth of the Binary for Hunting Deeply Hidden Software Vulnerabilities.
- Published in:
- Future Internet, 2020, v. 12, n. 4, p. 74, doi. 10.3390/fi12040074
- By:
- Publication type:
- Article
A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices.
- Published in:
- Future Internet, 2020, v. 12, n. 2, p. 27, doi. 10.3390/fi12020027
- By:
- Publication type:
- Article
Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 4, p. 598, doi. 10.3390/sym12040598
- By:
- Publication type:
- Article
Enhancing Security and Sustainability of e-Learning Software Systems: A Comprehensive Vulnerability Analysis and Recommendations for Stakeholders.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 19, p. 14132, doi. 10.3390/su151914132
- By:
- Publication type:
- Article
Analysis of Transportation Network Vulnerability and Resilience within an Urban Agglomeration: Case Study of the Greater Bay Area, China.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 18, p. 7410, doi. 10.3390/su12187410
- By:
- Publication type:
- Article
Computational System to Classify Cyber Crime Offenses using Machine Learning.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 10, p. 4087, doi. 10.3390/su12104087
- By:
- Publication type:
- Article
Sustainability Reporting as a Mixture of CSR and Sustainable Development. A Model for Micro-Enterprises within the Romanian Forestry Sector.
- Published in:
- Sustainability (2071-1050), 2020, v. 12, n. 2, p. 603, doi. 10.3390/su12020603
- By:
- Publication type:
- Article
Robust Sourcing Under Multilevel Supply Risks: Analysis of Random Yield and Capacity.
- Published in:
- INFORMS Journal on Computing, 2023, v. 35, n. 1, p. 178, doi. 10.1287/ijoc.2022.1254
- By:
- Publication type:
- Article
Multiple social platforms reveal actionable signals for software vulnerability awareness: A study of GitHub, Twitter and Reddit.
- Published in:
- PLoS ONE, 2020, v. 15, n. 3, p. 1, doi. 10.1371/journal.pone.0230250
- By:
- Publication type:
- Article
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm.
- Published in:
- PLoS ONE, 2020, v. 15, n. 2, p. 1, doi. 10.1371/journal.pone.0228439
- By:
- Publication type:
- Article
Population extinctions driven by climate change, population size, and time since observation may make rare species databases inaccurate.
- Published in:
- PLoS ONE, 2019, v. 14, n. 10, p. 1, doi. 10.1371/journal.pone.0210378
- By:
- Publication type:
- Article
FACTORS INFLUENCING INTERNET BANKING ADOPTION.
- Published in:
- Social Behavior & Personality: an international journal, 2016, v. 44, n. 9, p. 1443, doi. 10.2224/sbp.2016.44.9.1443
- By:
- Publication type:
- Article
Timber Security Practices, Vulnerabilities, and Challenges in the Southern United States.
- Published in:
- Society & Natural Resources, 2020, v. 33, n. 7, p. 842, doi. 10.1080/08941920.2020.1725988
- By:
- Publication type:
- Article
Metadata, Jailbreaking, and the Cybernetic Governmentality of iOS: Or, the Need to Distinguish Digital Privacy from digital privacy.
- Published in:
- Surveillance & Society, 2020, v. 18, n. 1, p. 90, doi. 10.24908/ss.v18i1.13118
- By:
- Publication type:
- Article
Uncertain Archives: Approaching the Unknowns, Errors, and Vulnerabilities of Big Data through Cultural Theories of the Archive.
- Published in:
- Surveillance & Society, 2019, v. 17, n. 3/4, p. 422, doi. 10.24908/ss.v17i3/4.12330
- By:
- Publication type:
- Article
Blended-Reality Training: A New Approach to Simulations.
- Published in:
- TIP: The Industrial-Organizational Psychologist, 2020, p. 1
- By:
- Publication type:
- Article
Still the fire-proof house? An analysis of Canada's cyber security strategy.
- Published in:
- International Journal, 2011, v. 67, n. 1, p. 155
- By:
- Publication type:
- Article
BINCODEX: A comprehensive and multi-level dataset for evaluating binary code similarity detection techniques.
- Published in:
- BenchCouncil Transactions on Benchmarks, Standards & Evaluations, 2024, v. 4, n. 2, p. 1, doi. 10.1016/j.tbench.2024.100163
- By:
- Publication type:
- Article
Discovering API usage specifications for security detection using two-stage code mining.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00224-w
- By:
- Publication type:
- Article
TECHNOLOGY AND INDIVIDUAL PRIVACY RIGHTS: THE FOURTH AMENDMENT IMPLICATIONS OF EXPLOITING ZERO-DAY VULNERABILITIES FOR DOMESTIC INVESTIGATIONS.
- Published in:
- Columbia Human Rights Law Review, 2015, v. 47, n. 1, p. 242
- By:
- Publication type:
- Article
Decision Model for Predicting Social Vulnerability Using Artificial Intelligence.
- Published in:
- ISPRS International Journal of Geo-Information, 2019, v. 8, n. 12, p. 575, doi. 10.3390/ijgi8120575
- By:
- Publication type:
- Article
Exploratory Testing of an Artificial Neural Network Classification for Enhancement of the Social Vulnerability Index.
- Published in:
- ISPRS International Journal of Geo-Information, 2015, v. 4, n. 4, p. 1774, doi. 10.3390/ijgi4041774
- By:
- Publication type:
- Article
A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study.
- Published in:
- Journal of Software: Evolution & Process, 2024, v. 36, n. 7, p. 1, doi. 10.1002/smr.2639
- By:
- Publication type:
- Article
An empirical evaluation of deep learning‐based source code vulnerability detection: Representation versus models.
- Published in:
- Journal of Software: Evolution & Process, 2023, v. 35, n. 11, p. 1, doi. 10.1002/smr.2422
- By:
- Publication type:
- Article
Trait‐based climate vulnerability assessments in data‐rich systems: An application to eastern Bering Sea fish and invertebrate stocks.
- Published in:
- Global Change Biology, 2019, v. 25, n. 11, p. 3954, doi. 10.1111/gcb.14763
- By:
- Publication type:
- Article
Cyber Insurance 101: Coverage Options and Provider Expectations.
- Published in:
- CPA Journal, 2023, v. 93, n. 11/12, p. 16
- By:
- Publication type:
- Article
The Security Challenges Emerging from the Technological Developments: A Practical Case Study of Organizational Awareness to the Security Risks.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 6, p. 2032, doi. 10.1007/s11036-018-01208-0
- By:
- Publication type:
- Article
Algebraic Matching of Vulnerabilities in a Low-Level Code.
- Published in:
- ISeCure, 2019, v. 11, n. 3, p. 1
- By:
- Publication type:
- Article
An approach to modeling and simulating resiliency in multidisciplinary microservice networks.
- Published in:
- International Journal of Modeling, Simulation & Scientific Computing, 2023, v. 14, n. 3, p. 1, doi. 10.1142/S1793962323500113
- By:
- Publication type:
- Article