We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms

    With the increasingly serious trend of information security, software vulnerability has become one of the main threats to computer security. How to...
    Yiran Sun, Ziqi Wang, ... Baojiang Cui in Advances in Internet, Data & Web Technologies
    Conference paper 2024
  2. Program Source Code Vulnerability Mining Scheme Based on Abstract Syntax Tree

    With the continuous growth of the number and scale of computing software, the occurrence rate of vulnerabilities in program source code has also...
    Zhangming Lin, Zhen Guo in Frontier Computing
    Conference paper 2023
  3. Detecting vulnerability in source code using CNN and LSTM network

    Automated vulnerability detection has become a research hot spot because it is beneficial for improving software quality and security. The code...

    Junjun Guo, Zhengyuan Wang, ... Yang Xue in Soft Computing
    Article 03 July 2021
  4. Log4j Vulnerability

    Log4j vulnerability was publicly disclosed on December 10, 2021, and it is considered the most severe security breach of all time. Hundreds of...
    Pedro Ferreira, Filipe Caldeira, ... Maryam Abbasi in Information Technology and Systems
    Conference paper 2023
  5. Vulnerability Analysis of Satellite Products

    Through the analysis of satellite vulnerability characteristics and the statistics of damage accidents, this paper obtains four categories of risk...
    Zhibin Liu, Zhe Liu, ... Chenlei Chu in Signal and Information Processing, Networking and Computers
    Conference paper 2024
  6. An attention-based automatic vulnerability detection approach with GGNN

    Vulnerability detection has long been an important issue in software security. The existing methods mainly define the rules and features of...

    Gaigai Tang, Lin Yang, ... Huiqiang Wang in International Journal of Machine Learning and Cybernetics
    Article 16 April 2023
  7. Vulnerability Analysis - Business Case

    Vulnerability analysis of an organization’s assets is one of the basic tools for security risk management. In particular, the Microsoft Center...
    Petr Doucek, Milos Maryska, Lea Nedomova in Information Technology and Systems
    Conference paper 2024
  8. Vulnerability Assessment

    The goal of vulnerability assessment is to provide an objective analysis of the current and projected vulnerabilities. It is the process of scanning...
    Chapter 2023
  9. Comparative Analysis of Open-Source Vulnerability Scanners for IoT Devices

    Internet of Things devices are commonly overlooked when it comes to security. Deployment follows the trend that the devices are powered on and...
    Conference paper 2022
  10. A CNN-based automatic vulnerability detection

    With the advent of the Internet, the activities of individuals and businesses have expanded into the online realm. As a result, vulnerabilities that...

    Jung Hyun An, Zhan Wang, Inwhee Joe in EURASIP Journal on Wireless Communications and Networking
    Article Open access 24 May 2023
  11. Semantic-based vulnerability detection by functional connectivity of gated graph sequence neural networks

    In computer security, semantic learning is helpful in understanding vulnerability requirements, realizing source code semantics, and constructing...

    Canan Batur Şahin in Soft Computing
    Article 02 January 2023
  12. Security Vulnerability Scanning Scheme of Web Application Based on Django

    With the continuous development of internet technology, web applications are becoming more and more popular, and the resulting open-source code...
    Conference paper 2024
  13. Vulnerability Assessment of Groundwater-Based Public Drinking Water Supply System of Kamrup District, Assam, India Considering Social Parameters

    The work aims to assess the social vulnerability index of the groundwater-based public water supply system of Kamrup district of Assam, India. The...

    Jayanta Goswami, Rajib Kumar Bhattacharjya in Journal of The Institution of Engineers (India): Series A
    Article 19 April 2023
  14. Improving software vulnerability classification performance using normalized difference measures

    Vulnerability Classification Models (VCMs) play a crucial role in software reliability engineering and hence, have attracted significant studies from...

    Patrick Kwaku Kudjo, Selasie Aformaley Brown, Solomon Mensah in International Journal of System Assurance Engineering and Management
    Article 15 April 2023
  15. Seismic Vulnerability Index Approach

    This chapter introduces a proposed seismic vulnerability index (SVI) approach for assessing the earthquake risk of reinforced concrete (RC)...
    Moustafa Moufid Kassem, Fadzli Mohamed Nazri in Seismic Vulnerability Index Assessment Framework of RC Structures
    Chapter 2023
  16. Text mining based an automatic model for software vulnerability severity prediction

    Software vulnerabilities reported every year increase exponentially, leading to the exploitation of software systems. Hence, when a vulnerability is...

    Article 31 May 2024
  17. Vulnerability Assessment of Cyber Physical Power System Based on Improved Cascading Failure Model

    Aiming at the problem that the existing vulnerability assessment models ignore the state transformation of information nodes and delay effect of...

    Dong Ding, Honglin Wu, ... Zhigang Lu in Journal of Electrical Engineering & Technology
    Article 31 May 2024
  18. VulRep: vulnerability repair based on inducing commits and fixing commits

    With the rapid development of the information age, software vulnerabilities have threatened the safety of communication and mobile network, and...

    Article Open access 21 April 2023
  19. Assessment of vulnerability to waterlogging in subway stations using integrated EWM-TOPSIS

    Waterlogging in subway stations has a devastating impact on normal operation of important urban facilities and can cause harm to passengers and...

    He-Ting **ang, Hai-Min Lyu in Smart Construction and Sustainable Cities
    Article Open access 14 November 2023
  20. A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS

    With the development of blockchain technology, smart contracts have attracted a lot of attention in recent years. They are widely used because they...

    Lejun Zhang, Yuan Li, ... Zhihong Tian in Journal of Signal Processing Systems
    Article 12 May 2023
Did you find what you were looking for? Share feedback.