The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for flaws with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1989 (18) 1990-1993 (17) 1994-1996 (24) 1997-1998 (21) 1999-2000 (34) 2001 (40) 2002 (29) 2003 (56) 2004 (77) 2005 (76) 2006 (91) 2007 (100) 2008 (104) 2009 (76) 2010 (19) 2011 (18) 2012-2013 (26) 2014-2015 (32) 2016-2017 (27) 2018 (17) 2019 (17) 2020 (22) 2021-2022 (40) 2023 (26) 2024 (5)
Publication types (Num. hits)
article(267) incollection(8) inproceedings(728) phdthesis(9)
Venues (Conferences, Journals, ...)
CoRR(30) IEEE Secur. Priv.(18) IACR Cryptol. ePrint Arch.(11) ASE(10) Computer(10) ICSM(9) IEEE Trans. Software Eng.(9) SAC(9) ACSAC(8) IEEE Softw.(7) ACISP(6) APSEC(6) ARES(6) Commun. ACM(6) COMPSAC (1)(6) CSFW(6) More (+10 of total 591)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 937 occurrences of 669 keywords

Results
Found 1012 publication records. Showing 1012 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
83Radu Marinescu 0001 Detecting Design Flaws via Metrics in Object-Oriented Systems. Search on Bibsonomy TOOLS (39) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF metrics, Reengineering, design flaws, problem detection
78Laura Falk, Atul Prakash 0001, Kevin Borders Analyzing websites for user-visible security design flaws. Search on Bibsonomy SOUPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
69Mazeiar Salehie, Shimin Li, Ladan Tahvildari A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws. Search on Bibsonomy ICPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
61Mary Lou Soffa Path Sensitive Analysis for Security Flaws. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
60Miguel Carrasco, Domingo Mery Automatic Multiple Visual Inspection on Non-calibrated Image Sequence with Intermediate Classifier Block. Search on Bibsonomy PSIVT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computer vision, industrial applications, defect detection, multiple view geometry, automated visual inspection
58Petru Florin Mihancea, Radu Marinescu 0001 Towards the Optimization of Automatic Detection of Design Flaws in Object-Oriented Software Systems. Search on Bibsonomy CSMR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF metrics, object-oriented design, threshold, design flaws
58Raphael Chung-Wei Phan, Huo-Chong Ling Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs. Search on Bibsonomy IWDW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Watermark detection protocol, flaws, generic, identification, zero knowledge proof
53Dennis K. Nilsson, Phillip A. Porras, Erland Jonsson How to Secure Bluetooth-Based Pico Networks. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pico networks, security controls, implementation flaws, Bluetooth, design flaws
52José Meseguer 0001, Ralf Sasse, Helen J. Wang, Yi-Min Wang A Systematic Approach to Uncover Security Flaws in GUI Logic. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Radu Marinescu 0001 Detection Strategies: Metrics-Based Rules for Detecting Design Flaws. Search on Bibsonomy ICSM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF metrics, object-oriented design, quality assurance, design heuristics, design flaws
49Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system
48Kyung-suk Lhee, Steve J. Chapin Detection of file-based race conditions. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Time-of-check-to-time-of-use (TOCTTOU) flaws, Security, Race condition
48Sam Weber, Paul A. Karger, Amit M. Paradkar A software flaw taxonomy: aiming tools at security. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF argument validation, asynchronous attacks, security taxonomies, testing, static analysis, buffer overflows, security flaws
44Jörg P. Müller, Bernhard Bauer Agent-Oriented Software Technologies: Flaws and Remedies. Search on Bibsonomy AOSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Howard A. Sholl, Kevin Morris, James Norris A Multimicroprocessor System for Real-Time Classification of Railroad Track Flaws. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1982 DBLP  DOI  BibTeX  RDF pipeline system, railroad track flaws, pattern recognition, real-time system, Multiple processor
40Wenliang Du, Aditya P. Mathur Testing for Software Vulnerability Using Environment Perturbation. Search on Bibsonomy DSN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF environment perturbation, fault injection, Security testing, security flaws
36François Plumerault, Baptiste David Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
36Katja Tuma, Riccardo Scandariato, Musard Balliu Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis. Search on Bibsonomy ICSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
35Marco Pistoia, Stephen J. Fink, Robert J. Flynn, Eran Yahav When Role Models Have Flaws: Static Validation of Enterprise Security Policies. Search on Bibsonomy ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Giuseppe Acciani, Gioacchino Brunetti, Ernesto Chiarantoni, Girolamo Fornarelli Automatic Evaluation of Flaws in Pipes by means of Ultrasonic Waveforms and Neural Networks. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Guilin Wang, Sihan Qing Security Flaws in Several Group Signatures Proposed by Popescu. Search on Bibsonomy ICCSA (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF digital signature, information security, group signature
35Thierry Miceli, Houari A. Sahraoui, Robert Godin A Metric Based Technique for Design Flaws Detection and Correction. Search on Bibsonomy ASE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF OO Metric, OO Reengineering, Quality estimation models
35Keishi Tajima Static Detection of Security Flaws in Object-Oriented Databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
34Matt Bishop About Penetration Testing. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Ching-Liang Su Robotic Intelligence for Industrial Automation: Object Flaw Auto Detection and Pattern Recognition by Object Location Searching, Object Alignment, and Geometry Comparison. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF image inspection, image movement, image subtraction, geometry matching
34Richard E. Smith Cost profile of a highly assured, secure operating system. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF LOCK (Logical Coprocessing Kernel), security kernels
31Herbert H. Thompson Application Penetration Testing. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF software testing, QA, security vulnerabilities, security flaws
31Richard E. Smith Mandatory Protection for Internet Server Software. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws
27Guoqiang Shu, Yating Hsu, David Lee 0001 Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. Search on Bibsonomy FORTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fuzz testing, Security Testing, Protocol Synthesis
27Angela Lozano A methodology to assess the impact of source code flaws in changeability, and its application to clones. Search on Bibsonomy ICSM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Toshinori Araki, Satoshi Obana Flaws in Some Secret Sharing Schemes Against Cheating. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Rafael Bailón-Moreno, Encarnación Jurado-Alameda, Rosario Ruiz-Baños, Jean Pierre Courtial Bibliometric laws: Empirical flaws of fit. Search on Bibsonomy Scientometrics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Michael C. Martin, V. Benjamin Livshits, Monica S. Lam Finding application errors and security flaws using PQL: a program query language. Search on Bibsonomy OOPSLA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF resource leaks, web applications, pattern matching, SQL injection, bug finding, program traces
27Patrick Baudisch, Desney S. Tan, Drew Steedly, Eric Rudolph, Matthew Uyttendaele, Chris Pal, Richard Szeliski Panoramic viewfinder: providing a real-time preview to help users avoid flaws in panoramic pictures. Search on Bibsonomy OZCHI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF user interface, real-time, interactive, panorama, stitching, preview
27Greg Goth IE Security Flaws Spike Interest in Alternative Browsers. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Opera, alternative browsers, IE, Firefox, browser security
27Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. J. Jankun-Kelly Detecting Flaws and Intruders with Visual Data Analysis. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Phong Q. Nguyen Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP
27Heikki Verta, Titos Saridakis Detection of Heap Management Flaws in Component-Based Software. Search on Bibsonomy EUROMICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Nick L. Petroni Jr., William A. Arbaugh The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Wireless Network Security
27Masayuki Abe, Hideki Imai Flaws in Some Robust Optimistic Mix-Nets. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Tetsuo Asano, Hiro Ito, Souichi Kimura, Shigeaki Shimazu Repairing Flaws in a Picture Based on a Geometric Representation of a Digital Image. Search on Bibsonomy ISAAC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Siliang Li, Gang Tan Finding bugs in exceptional situations of JNI programs. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF static analysis, taint analysis, java native interface
26Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Designated Confirmer Signature, Digital Signature, Fair Exchange
26Bin Zhang 0003, Dengguo Feng Security analysis of a new stream cipher. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence
26Sen Xu, Manton M. Matthews, Chin-Tser Huang Security issues in privacy and key management protocols of IEEE 802.16. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, key management, IEEE 802.16, roaming
26Adrian Trifu, Olaf Seng, Thomas Genssler Automated Design Flaw Correction in Object-Oriented Systems. Search on Bibsonomy CSMR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Hiroaki Chujo, Yuji Shono, Yoshitomo Ikkai, Norihisa Komoda A rapid scheduling method with resource selection by flaw analysis for a rectangular cutting stock problem against flawed and connectable resources. Search on Bibsonomy SMC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Matthew R. McLaughlin, Jonathan L. Herlocker A collaborative filtering algorithm and evaluation metric that accurately model the user experience. Search on Bibsonomy SIGIR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mean absolute error, machine learning, evaluation, algorithms, recommender systems, collaborative filtering, nearest neighbor, precision
26Olivier Pereira, Jean-Jacques Quisquater A Security Analysis of the Cliques Protocols Suites. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Nikita Borisov, Ian Goldberg, David A. Wagner 0001 Intercepting mobile communications: the insecurity of 802.11. Search on Bibsonomy MobiCom The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Wenli Wang, Zoltán Hidvégi, Andrew D. Bailey Jr., Andrew B. Whinston E-Process Design and Assurance Using Model Checking. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26George J. Mamic, Mohammed Bennamoun Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector. Search on Bibsonomy ICPR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi On Establishing and Fixing a Parallel Session Attack in a Security Protocol. Search on Bibsonomy IDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protocol flaws, parallel session attack, Security protocols
22Angela Lozano, Michel Wermelinger, Bashar Nuseibeh Assessing the impact of bad smells using historical information. Search on Bibsonomy IWPSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bad smells, source cede, empirical study, software maintenance, software quality, software evolution, design defects, design flaws
22Richard Wettel, Radu Marinescu 0001 Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments. Search on Bibsonomy SYNASC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF quality assurance, code duplication, design flaws
22V. Benjamin Livshits, Monica S. Lam Tracking pointers with path and context sensitivity for bug detection in C programs. Search on Bibsonomy ESEC / SIGSOFT FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SSA representation, program analysis, error detection, software security, pointer analysis, program representation, context-sensitive analysis, buffer overruns, path-sensitive analysis, security flaws
22Adriana Bodnarova, Mohammed Bennamoun, Kurt Kubik Suitability Analysis of Techniques for Flaw Detection in Textiles using Texture Analysis. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Flaw detection techniques, Textile quality control, Weaving flaws, Texture analysis, Case study, Visual inspection
22Takeshi Nakajo, Hitoshi Kume A Case History Analysis of Software Error Cause-Effect Relationships. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF cause-effect relationships, case-based error analysis, program faults, process flaws, structured analysis and structured design, Software development, human errors, Fault Tree Analysis
18Nerla Jean-Louis, Yunqi Li 0002, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller 0001 SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Zhaoyang Yin, Mingjun Chen, Linjie Zhao, Jian Cheng, Chao Tan, Xiaotao Li, Zhiyu Lin, Yankang Chen A novel automatic classification approach for micro-flaws on the large-aperture optics surface based on multi-light source fusion and integrated deep learning architecture. Search on Bibsonomy J. Intell. Manuf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Qiao Jin 0001, Fangyuan Chen, Yiliang Zhou, Ziyang Xu, Justin M. Cheung, Robert Chen, Ronald M. Summers, Justin F. Rousseau, Peiyun Ni, Marc J. Landsman, Sally L. Baxter, Subhi J. Al'Aref, Yijia Li, Michael F. Chiang, Yifan Peng, Zhiyong Lu Hidden Flaws Behind Expert-Level Accuracy of GPT-4 Vision in Medicine. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Jakob Svennevik Notland, Jingyue Li, Mariusz Nowostawski, Peter Halland Haro SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Lucas Castillo, Pablo León-Villagrá, Nick Chater, Adam Sanborn Explaining the flaws in human random generation as local sampling with momentum. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Andreas Park The Conceptual Flaws of Decentralized Automated Market Making. Search on Bibsonomy Manag. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zhiliang Liu, Liyuan Ren Shaking Noise Exploration and Elimination for Detecting Local Flaws of Steel Wire Ropes Based on Magnetic Flux Leakages. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18João Pedro Costa Barnabé, Lenin Patricio Jiménez Jiménez, Gustavo Fraidenraich, Eduardo Rodrigues de Lima, Harrison Franca Dos Santos Quantification of Damages and Classification of Flaws in Mono-Crystalline Photovoltaic Cells Through the Application of Vision Transformers. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Prashanth Baskaran, Artur Lopes Ribeiro, Helena Maria Geirinhas Ramos Theoretical Predictions of Perturbed Magnetic Flux Density Components Due to Narrow Flaws in ECT. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hal Berghel Fatal Flaws in ChatAI as a Content Generator. Search on Bibsonomy Computer The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Louis Mahon, Lei Shah, Thomas Lukasiewicz Correcting Flaws in Common Disentanglement Metrics. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Anya Belz, Craig Thomson, Ehud Reiter, Gavin Abercrombie, Jose Maria Alonso-Moral, Mohammad Arvan, Jackie Chi Kit Cheung, Mark Cieliebak, Elizabeth Clark, Kees van Deemter, Tanvi Dinkar, Ondrej Dusek, Steffen Eger, Qixiang Fang, Albert Gatt, Dimitra Gkatzia, Javier González-Corbelle, Dirk Hovy, Manuela Hürlimann, Takumi Ito, John D. Kelleher, Filip Klubicka, Huiyuan Lai, Chris van der Lee, Emiel van Miltenburg, Yiru Li, Saad Mahamood, Margot Mieskes, Malvina Nissim, Natalie Parde, Ondrej Plátek, Verena Rieser, Pablo Mosteiro Romero, Joel R. Tetreault, Antonio Toral, Xiaojun Wan 0001, Leo Wanner, Lewis Watson, Diyi Yang Missing Information, Unresponsive Authors, Experimental Flaws: The Impossibility of Assessing the Reproducibility of Previous Human Evaluations in NLP. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Balázs Hidasi, Ádám Tibor Czapp Widespread Flaws in Offline Evaluation of Recommender Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Minghui Hu 0001, Jianbin Zheng, Chuanxia Zheng, Chaoyue Wang, Dacheng Tao, Tat-Jen Cham One More Step: A Versatile Plug-and-Play Module for Rectifying Diffusion Schedule Flaws and Enhancing Low-Frequency Controls. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18George Stein, Jesse C. Cresswell, Rasa Hosseinzadeh, Yi Sui, Brendan Leigh Ross, Valentin Villecroze, Zhaoyan Liu, Anthony L. Caterini, J. Eric T. Taylor, Gabriel Loaiza-Ganem Exposing flaws of generative model evaluation metrics and their unfair treatment of diffusion models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mustafa Shukor, Alexandre Ramé, Corentin Dancette, Matthieu Cord Beyond Task Performance: Evaluating and Reducing the Flaws of Large Multimodal Models with In-Context Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Alireza Sadeghi-Nasab, Vahid Rafe A comprehensive review of the security flaws of hashing algorithms. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18David Fifield Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Nerla Jean-Louis, Yunqi Li 0002, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller 0001 SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18Issam Hammad, Matthew Poloni, Andrew Isherwood, Ryan Simpson Auto Sizing of CANDU Nuclear Reactor Fuel Channel Flaws from UT Scans. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian Using word embedding and convolution neural network for bug triaging by considering design flaws. Search on Bibsonomy Sci. Comput. Program. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Oskar Sjögren, Gustav Grund Pihlgren, Fredrik Sandin, Marcus Liwicki Identifying and Mitigating Flaws of Deep Perceptual Similarity Metrics. Search on Bibsonomy NLDL The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Meinhard Kissich, Marcel Baunach Formal Property Verification for Early Discovery of Functional Flaws in Digital Designs: A Designer's Guide. Search on Bibsonomy DSD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. Search on Bibsonomy SECRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18João Inácio, Ibéria Medeiros CorCA: An Automatic Program Repair Tool for Checking and Removing Effectively C Flaws. Search on Bibsonomy ICST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Balázs Hidasi, Ádám Tibor Czapp Widespread Flaws in Offline Evaluation of Recommender Systems. Search on Bibsonomy RecSys The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Steven Moore, Ellen Fang, Huy Anh Nguyen, John C. Stamper Crowdsourcing the Evaluation of Multiple-Choice Questions Using Item-Writing Flaws and Bloom's Taxonomy. Search on Bibsonomy L@S The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18George Stein, Jesse C. Cresswell, Rasa Hosseinzadeh, Yi Sui, Brendan Leigh Ross, Valentin Villecroze, Zhaoyan Liu, Anthony L. Caterini, J. Eric T. Taylor, Gabriel Loaiza-Ganem Exposing flaws of generative model evaluation metrics and their unfair treatment of diffusion models. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
18Koji Noshiro, Koji Hasebe Flaws of Termination and Optimality in ADOPT-based Algorithms. Search on Bibsonomy IJCAI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hongjian Cao, Lin Huang, Shuwei Hu, Shangcheng Shi, Yujia Liu Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Annika Reinke Eliminating flaws in biomedical image analysis validation (PDF / PS) Search on Bibsonomy 2023   RDF
18Saher Ghayyad, Shengzhi Du, Anish Mathew Kurien The flaws of Internet of Things (IoT) intrusion detection and prevention schemes. Search on Bibsonomy Int. J. Sens. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Carlos Nkuba Kayembe, Seulbae Kim, Sven Dietrich, Heejo Lee Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Sijun Niu, Vikas Srivastava Ultrasound classification of interacting flaws using finite element simulations and convolutional neural network. Search on Bibsonomy Eng. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Christian Hugo Hoffmann Technological Brave New World? Eschatological Narratives on Digitalization and their Flaws. Search on Bibsonomy J. Artif. Intell. Conscious. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Oskar Sjögren, Gustav Grund Pihlgren, Fredrik Sandin, Marcus Liwicki Identifying and Mitigating Flaws of Deep Perceptual Similarity Metrics. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Hadas Orgad, Yonatan Belinkov Choose Your Lenses: Flaws in Gender Bias Evaluation. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Royi Rassin, Shauli Ravfogel, Yoav Goldberg DALLE-2 is Seeing Double: Flaws in Word-to-Concept Mapping in Text2Image Models. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian Using Word Embedding and Convolution Neural Network for Bug Triaging by Considering Design Flaws. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Joakim Misund, Bob Briscoe Disentangling Flaws in Linux DCTCP. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Chinedu I. Ossai, Nilmini Wickramasinghe Crowdsourcing Operational and Design Flaws of Diabetes Mobile Apps. Search on Bibsonomy J. Medical Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Ben Green 0002 The flaws of policies requiring human oversight of government algorithms. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1012 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license