We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 7,127 results
  1. Detection of vulnerabilities in blockchain smart contracts using deep learning

    Blockchain helps to give a sense of security as there is only one history of transactions visible to all the involved parties. Smart contracts enable...

    Namya Aankur Gupta, Mansi Bansal, ... Misha Kakkar in Wireless Networks
    Article 09 May 2024
  2. A Survey of Security Vulnerabilities and Detection Methods for Smart Contracts

    At present, smart contracts cannot guarantee absolute security, and they have exposed many security issues and caused incalculable losses. Due to the...
    Conference paper 2024
  3. Adobe Photoshop Vulnerabilities

    The impact of rapidly changing technology is now majorly contributing to the risk of upcoming new challenges. The advancements of computers can’t be...
    Conference paper 2023
  4. A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures

    The recent integration and collaboration of robots with networks expose new challenges and problems in terms of security. However, to the best of our...

    **ngmao Shao, Lun **e, ... Zhiliang Wang in Journal of Intelligent & Robotic Systems
    Article 03 November 2023
  5. A CNN-based automatic vulnerability detection

    With the advent of the Internet, the activities of individuals and businesses have expanded into the online realm. As a result, vulnerabilities that...

    Jung Hyun An, Zhan Wang, Inwhee Joe in EURASIP Journal on Wireless Communications and Networking
    Article Open access 24 May 2023
  6. WNV-Detector: automated and scalable detection of wireless network vulnerabilities

    The security of wireless routers receives much attention given by the increasing security threats. In the era of Internet of Things, many devices...

    Yanxi Huang, Fangzhou Zhu, ... Ting Lv in EURASIP Journal on Wireless Communications and Networking
    Article Open access 07 April 2021
  7. Security Issues and Vulnerabilities in Web Application

    Role of web security has become an important topic as web and web application became quite demanding and people started using them every day. Last...
    Sitara Anumotu, Kushagra Jha, ... Pronika Chawla in Next Generation of Internet of Things
    Conference paper 2023
  8. Security Vulnerabilities in Facebook Data Breach

    This research explores the intricate landscape of data breaches within Facebook (now Meta) from 2018 to 2021. The goal of this case study is to...
    Conference paper 2024
  9. An optimization technique for intrusion detection of industrial control network vulnerabilities based on BP neural network

    The aim of this research is to solve the problem that the intrusion detection model of industrial control system has low detection rate and detection...

    Wenzhong **a, Rahul Neware, ... Ali Rizwan in International Journal of System Assurance Engineering and Management
    Article 04 January 2022
  10. Prediction of Software Vulnerabilities Using Random Forest Regressor

    The launch of new software technologies with new features helps the developer in software development but it can be prone to vulnerabilities....
    Navirah Kamal, Supriya Raheja in Computational Intelligence
    Conference paper 2023
  11. Application of ISM in Evaluating Inter-relationships Among Software Vulnerabilities

    Complicated digital communication networks generate faults in development, implementation and governance, which are the main cause of software...
    Misbah Anjum, P. K. Kapur, ... Vernika Agarwal in Computational Intelligence for Engineering and Management Applications
    Conference paper 2023
  12. A Comparative Study of Vulnerabilities Scanners for Web Applications: Nexpose vs Acunetix

    As known, everyone uses web applications to make purchases, transfer funds, upload data, etc. Meanwhile, the security of these web applications has...
    Bochra Labiad, Mariam Tanana, ... Abdelouahid Lyhyaoui in International Conference on Advanced Intelligent Systems for Sustainable Development
    Conference paper 2023
  13. Visual Studio Vulnerabilities and Its Secure Software Development

    The rapid advances in technology are bringing about a new set of difficulties in the form of vulnerabilities and their exploitation by attackers to...
    Conference paper 2023
  14. Cybersecurity for Industrial IoT, Threats, Vulnerabilities, and Solutions: A Brief Review

    The Industrial Internet of Things (IIoT) refers to use connected devices and technology in industrial settings such as manufacturing, energy, and...
    Conference paper 2023
  15. APT Attack Detection Based on Graph Convolutional Neural Networks

    Advanced persistent threat (APT) attacks are malicious and targeted forms of cyberattacks that pose significant challenges to the information...

    Weiwu Ren, **ntong Song, ... Wenjuan Li in International Journal of Computational Intelligence Systems
    Article Open access 20 November 2023
  16. A Scalable Middleware for IoT Vulnerability Detection

    Cyberattacks targeting vulnerabilities in the internet of things (IoT) devices are increasing in number annually. Accordingly, various methods and...
    Minami Yoda, Shigeo Nakamura, ... Akihiko Ohsuga in Networking and Parallel/Distributed Computing Systems
    Chapter 2024
  17. A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS

    With the development of blockchain technology, smart contracts have attracted a lot of attention in recent years. They are widely used because they...

    Lejun Zhang, Yuan Li, ... Zhihong Tian in Journal of Signal Processing Systems
    Article 12 May 2023
  18. CFG Analysis for Detecting Vulnerabilities in Smart Contracts

    Smart contracts are a leading light moment in blockchain technology 2.0 and are universally used in various applications. A smart contract is a...
    Karishma Yadav, Smita Naval in Smart Trends in Computing and Communications
    Conference paper 2023
  19. Applied methods to detect and prevent vulnerabilities within PLC alarms code

    Abstract

    Adversaries may target alerting alarms raised by PLCs (Programmable Logic Controllers) to prevent notifying operators of critical conditions,...

    Abraham Serhane, Raad Raad, ... Mohamad Raad in SN Applied Sciences
    Article Open access 01 April 2022
  20. A Comparative Study of Novelty Detection Models for Zero Day Intrusion Detection in Industrial Internet of Things

    The detection of zero-day attacks in the IoT network is a challenging task due to unknown security vulnerabilities. Also, the unavailability of the...
    Uneneibotejit Otokwala, Murshedul Arifeen, Andrei Petrovski in Advances in Computational Intelligence Systems
    Conference paper 2024
Did you find what you were looking for? Share feedback.