Search
Search Results
-
Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms
With the increasingly serious trend of information security, software vulnerability has become one of the main threats to computer security. How to... -
Program Source Code Vulnerability Mining Scheme Based on Abstract Syntax Tree
With the continuous growth of the number and scale of computing software, the occurrence rate of vulnerabilities in program source code has also... -
Detecting vulnerability in source code using CNN and LSTM network
Automated vulnerability detection has become a research hot spot because it is beneficial for improving software quality and security. The code...
-
Log4j Vulnerability
Log4j vulnerability was publicly disclosed on December 10, 2021, and it is considered the most severe security breach of all time. Hundreds of... -
Vulnerability Analysis of Satellite Products
Through the analysis of satellite vulnerability characteristics and the statistics of damage accidents, this paper obtains four categories of risk... -
An attention-based automatic vulnerability detection approach with GGNN
Vulnerability detection has long been an important issue in software security. The existing methods mainly define the rules and features of...
-
Vulnerability Analysis - Business Case
Vulnerability analysis of an organization’s assets is one of the basic tools for security risk management. In particular, the Microsoft Center... -
Vulnerability Assessment
The goal of vulnerability assessment is to provide an objective analysis of the current and projected vulnerabilities. It is the process of scanning... -
Comparative Analysis of Open-Source Vulnerability Scanners for IoT Devices
Internet of Things devices are commonly overlooked when it comes to security. Deployment follows the trend that the devices are powered on and... -
A CNN-based automatic vulnerability detection
With the advent of the Internet, the activities of individuals and businesses have expanded into the online realm. As a result, vulnerabilities that...
-
Semantic-based vulnerability detection by functional connectivity of gated graph sequence neural networks
In computer security, semantic learning is helpful in understanding vulnerability requirements, realizing source code semantics, and constructing...
-
Security Vulnerability Scanning Scheme of Web Application Based on Django
With the continuous development of internet technology, web applications are becoming more and more popular, and the resulting open-source code... -
Vulnerability Assessment of Groundwater-Based Public Drinking Water Supply System of Kamrup District, Assam, India Considering Social Parameters
The work aims to assess the social vulnerability index of the groundwater-based public water supply system of Kamrup district of Assam, India. The...
-
Improving software vulnerability classification performance using normalized difference measures
Vulnerability Classification Models (VCMs) play a crucial role in software reliability engineering and hence, have attracted significant studies from...
-
Seismic Vulnerability Index Approach
This chapter introduces a proposed seismic vulnerability index (SVI) approach for assessing the earthquake risk of reinforced concrete (RC)... -
Text mining based an automatic model for software vulnerability severity prediction
Software vulnerabilities reported every year increase exponentially, leading to the exploitation of software systems. Hence, when a vulnerability is...
-
Vulnerability Assessment of Cyber Physical Power System Based on Improved Cascading Failure Model
Aiming at the problem that the existing vulnerability assessment models ignore the state transformation of information nodes and delay effect of...
-
VulRep: vulnerability repair based on inducing commits and fixing commits
With the rapid development of the information age, software vulnerabilities have threatened the safety of communication and mobile network, and...
-
Assessment of vulnerability to waterlogging in subway stations using integrated EWM-TOPSIS
Waterlogging in subway stations has a devastating impact on normal operation of important urban facilities and can cause harm to passengers and...
-
A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS
With the development of blockchain technology, smart contracts have attracted a lot of attention in recent years. They are widely used because they...