We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 2,514 results
  1. Generic Error SDP and Generic Error CVE

    This paper introduces a new family of CVE schemes built from generic errors (GE-CVE) and identifies a vulnerability therein. To introduce the...
    Felice Manganiello, Freeman Slaughter in Code-Based Cryptography
    Conference paper 2023
  2. A novel approach to continuous CVE analysis on enterprise operating systems for system vulnerability assessment

    Advances in information and technology have provided great opportunities and conveniences for human life. However, with this process, attackers have...

    Yusuf Kocaman, Serkan Gönen, ... Ercan Nurcan Yilmaz in International Journal of Information Technology
    Article 09 February 2022
  3. On the Usage of NLP on CVE Descriptions for Calculating Risk

    In order to conduct a risk analysis on an ecosystem the potential threats to its assets must first be identified. The Risk Modelling Tool (RMT) of...
    Thrasyvoulos Giannakopoulos, Konstantinos Maliatsos in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  4. SMET: Semantic Map** of CVE to ATT&CK and Its Application to Cybersecurity

    Cybercriminals relentlessly pursue vulnerabilities across cyberspace to exploit software, threatening the security of individuals, organizations, and...
    Basel Abdeen, Ehab Al-Shaer, ... Kevin Hamlen in Data and Applications Security and Privacy XXXVII
    Conference paper 2023
  5. Extended Abstract: Towards Reliable and Scalable Linux Kernel CVE Attribution in Automated Static Firmware Analyses

    In vulnerability assessments, software component-based CVE attribution is a common method to identify possibly vulnerable systems at scale. However,...
    Conference paper 2023
  6. On the coordination of vulnerability fixes

    The Common Vulnerabilities and Exposures (CVE) program is dedicated to analyzing vulnerabilities, then to assigning a unique ID to them and...

    Jiahuei Lin, Bram Adams, Ahmed E. Hassan in Empirical Software Engineering
    Article 10 November 2023
  7. Viewpoint-sharing method with reduced motion sickness in object-based VR/AR collaborative virtual environment

    We propose a viewpoint-sharing method with reduced motion sickness in an object-based remote collaborative virtual environment (CVE). The method is...

    Tuvshintulga Tserenchimed, Hyungki Kim in Virtual Reality
    Article Open access 11 June 2024
  8. A study of synergy between programming practices evolution and information disclosure-causing vulnerabilities

    The Common Vulnerabilities and Exposures (CVE) is a formal dictionary of vulnerabilities and associated weaknesses reported by the community. As...

    Article 26 August 2023
  9. Towards Measuring Vulnerabilities and Exposures in Open-Source Packages

    Much of the current software depends on open-source components, which in turn have complex dependencies on other open-source libraries....
    Tobias Dam, Sebastian Neumaier in Data Science—Analytics and Applications
    Conference paper 2024
  10. Evaluating Models with Dynamic Sampling Holdout in Auto-ML

    Automated Machine Learning (Auto-ML) is a growing research area that is receiving great attention today. Multiple techniques have been developed to...

    Celio H. N. Larcher Jr, Helio J. C. Barbosa in SN Computer Science
    Article 05 October 2022
  11. Evaluating seed selection for fuzzing JavaScript engines

    JavaScript (JS), as a platform-independent programming language, remains to be the most popular language over the years. However, popular JavaScript...

    Ming Wen, Yongcong Wang, ... Hai ** in Empirical Software Engineering
    Article 26 September 2023
  12. Vulnerability management in Linux distributions

    Vulnerabilities in software systems not only lead to loss of revenue, but also to loss of reputation and trust. To avoid this, software providers...

    Jiahuei Lin, Haoxiang Zhang, ... Ahmed E. Hassan in Empirical Software Engineering
    Article 16 February 2023
  13. Automated Behavior Labeling During Team-Based Activities Involving Neurodiverse and Neurotypical Partners Using Multimodal Data

    The employment setting for autistic individuals in the USA is grim. Based on reports, individuals with ASD struggle to secure and retain employment...
    Conference paper 2023
  14. The Use of Counter Narratives to Combat Violent Extremism Online

    Due to recent rises in extremism across the globe (Dean et al. in J Polic Intell Count Terror 11:121–142, 2016; Le Roux in Responding to the rise in...
    Chapter 2023
  15. Automated CPE Labeling of CVE Summaries with Machine Learning

    Open Source Security and Dependency Vulnerability Management (DVM) has become a more vital part of the software security stack in recent years as...
    Conference paper 2020
  16. BTFuzzer: A Profile-Based Fuzzing Framework for Bluetooth Protocols

    Bluetooth vulnerabilities have become increasingly popular in recent years due to, in part, the remote exploitability of Bluetooth. Unfortunately, in...
    Min Jang, Yuna Hwang, ... Hyoungshick Kim in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
  17. Bl0ck: Paralyzing 802.11 Connections Through Block Ack Frames

    Despite Wi-Fi is at the eve of its seventh generation, security concerns regarding this omnipresent technology remain in the spotlight of the...
    Efstratios Chatzoglou, Vyron Kampourakis, Georgios Kambourakis in ICT Systems Security and Privacy Protection
    Conference paper 2024
  18. Entity Alignment Based on Multi-view Interaction Model in Vulnerability Knowledge Graphs

    Entity alignment (EA) aims to match the same entities in different Knowledge Graphs (KGs), which is a critical task in KG fusion. EA has recently...
    ** Jiang, Mohan Li in Web and Big Data
    Conference paper 2024
  19. XSnare: application-specific client-side cross-site scripting protection

    We present XSnare, a client-side Cross-Site Scripting (XSS) solution implemented as a Firefox extension. The client-side design of XSnare can protect...

    José Carlos Pazos, Jean-Sébastien Légaré, Ivan Beschastnikh in Empirical Software Engineering
    Article 17 August 2023
  20. Enhancing attack resilience of cyber-physical systems through state dependency graph models

    This paper presents a method that utilizes graph theory and state modelling algorithms to perform automatic complexity analysis of the architecture...

    Konstantinos Adamos, George Stergiopoulos, ... Dimitris Gritzalis in International Journal of Information Security
    Article Open access 22 July 2023
Did you find what you were looking for? Share feedback.