We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 10,000 results
  1. An extensive study of the effects of different deep learning models on code vulnerability detection in Python code

    Deep learning has achieved great progress in automated code vulnerability detection. Several code vulnerability detection approaches based on deep...

    Rongcun Wang, Senlei Xu, ... Ke Wang in Automated Software Engineering
    Article 31 January 2024
  2. A security vulnerability predictor based on source code metrics

    Detecting security vulnerabilities in the source code of software systems is one of the most important challenges in the field of software security....

    Puya Pakshad, Alireza Shameli-Sendi, Behzad Khalaji Emamzadeh Abbasi in Journal of Computer Virology and Hacking Techniques
    Article 17 February 2023
  3. IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications

    The proliferation of the Internet of Things (IoT) paradigm has ushered in a new era of connectivity and convenience. Consequently, rapid IoT...

    Guru Prasad Bhandari, Gebremariam Assres, ... Tor-Morten Grønli in International Journal of Information Security
    Article Open access 09 May 2024
  4. Identifying the systemic importance and systemic vulnerability of financial institutions based on portfolio similarity correlation network

    The indirect correlation among financial institutions, stemming from similarities in their portfolios, is a primary driver of systemic risk. However,...

    Man** Shao, Hong Fan in EPJ Data Science
    Article Open access 31 January 2024
  5. BovdGFE: buffer overflow vulnerability detection based on graph feature extraction

    Automatically detecting buffer overflow vulnerabilities is an important research topic in software security. Recent studies have shown that...

    **nghang Lv, Tao Peng, ... Wenli Cao in Applied Intelligence
    Article 12 November 2022
  6. Enhancing BERT-Based Language Model for Multi-label Vulnerability Detection of Smart Contract in Blockchain

    Smart contracts are decentralized applications that hold a pivotal role in blockchain-based systems. Smart contracts are composed of error-prone...

    Van Tong, Cuong Dao, ... Sami Souihi in Journal of Network and Systems Management
    Article 24 June 2024
  7. Cyber-Attack Analysis Using Vulnerability Assessment and Penetration Testing

    Networks and systems like computers and mobile devices are not secure enough and are vulnerable to numerous types of cyber-threats. The frequency of...
    Vijayashree Budyal, A. V. Vaibhav, ... Gaonkar Unnathi in Cyber Security and Digital Forensics
    Conference paper 2024
  8. Vulnerability Analysis of an Electric Vehicle Charging Ecosystem

    The increase of electric vehicles has exacerbated the need for adequate security measures in the electric vehicle charging ecosystem (EVCE)....
    Roland Plaka, Mikael Asplund, Simin Nadjm-Tehrani in Critical Information Infrastructures Security
    Conference paper 2024
  9. Software Vulnerability Detection Using an Enhanced Generalization Strategy

    Detecting vulnerabilities in software is crucial for preventing cybersecurity attacks, and current machine learning-based methods rely on large...
    Conference paper 2024
  10. Vulnerability Detection and Response: Current Status and New Approaches

    The rapid evolution of industrial components, the paradigm of Industry 4.0, and the new connectivity features introduced by 5G technology all...
    Ángel Longueira-Romero, Rosa Iglesias, ... Iñaki Garitano in CyberSecurity in a DevOps Environment
    Chapter 2024
  11. SPVF: security property assisted vulnerability fixing via attention-based models

    The past few years have witnessed the wide application of machine learning models to fix vulnerabilities automatically. However, existing approaches...

    Zhou Zhou, Lili Bo, ... Sicong Cao in Empirical Software Engineering
    Article 20 September 2022
  12. Application of Vulnerability Detection Technology Based on Network Space Recognition

    The rapid development of the Internet has brought great convenience to people, and the impact of network attacks caused by vulnerabilities has...
    Conference paper 2024
  13. Vulnerability Scanner

    The proliferation of cloud providers enables organizations to deploy applications that are affordable at scale. Deploying applications at scale is...
    Nanik Tolaram in Software Development with Go
    Chapter 2023
  14. Learning from what we know: How to perform vulnerability prediction using noisy historical data

    Vulnerability prediction refers to the problem of identifying system components that are most likely to be vulnerable. Typically, this problem is...

    Aayush Garg, Renzo Degiovanni, ... Yves Le Traon in Empirical Software Engineering
    Article Open access 20 September 2022
  15. Vulnerability discovery based on source code patch commit mining: a systematic literature review

    In recent years, there has been a remarkable surge in the adoption of open-source software (OSS). However, with the growing usage of OSS components...

    Article 06 January 2024
  16. The application of neural network for software vulnerability detection: a review

    To date, being benefited from the ability of automated feature extraction and the performance of software vulnerability identification, deep learning...

    Yuhui Zhu, Guanjun Lin, ... Jun Zhang in Neural Computing and Applications
    Article 27 November 2022
  17. A novel approach for software vulnerability detection based on intelligent cognitive computing

    Improving and enhancing the effectiveness of software vulnerability detection methods is urgently needed today. In this study, we propose a new...

    Cho Do Xuan, Dao Hoang Mai, ... Bui Van Cong in The Journal of Supercomputing
    Article 05 May 2023
  18. An automatic algorithm for software vulnerability classification based on CNN and GRU

    In order to improve the management efficiency of software vulnerability classification, reduce the risk of system being attacked and destroyed, and...

    Qian Wang, Yazhou Li, ... Jiadong Ren in Multimedia Tools and Applications
    Article 24 January 2022
  19. Database Security

    This chapter starts with an overview on database security. Then, access control is introduced with hands-on examples in the Structured Query Language...
    Michael Kaufmann, Andreas Meier in SQL and NoSQL Databases
    Chapter 2023
  20. VulMAE: Graph Masked Autoencoders for Vulnerability Detection from Source and Binary Codes

    The first graph masked auto-encoder (GraphMAE) model for software vulnerability detection is designed and developed, with a comparative evaluation...
    Mahmoud Zamani, Saquib Irtiza, ... Kevin W. Hamlen in Foundations and Practice of Security
    Conference paper 2024
Did you find what you were looking for? Share feedback.