The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Vulnerability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1986 (16) 1987-1992 (26) 1993-1996 (27) 1997-1998 (23) 1999-2000 (30) 2001 (24) 2002 (56) 2003 (86) 2004 (146) 2005 (196) 2006 (227) 2007 (250) 2008 (259) 2009 (209) 2010 (169) 2011 (137) 2012 (165) 2013 (198) 2014 (207) 2015 (226) 2016 (251) 2017 (257) 2018 (342) 2019 (424) 2020 (484) 2021 (581) 2022 (612) 2023 (775) 2024 (155)
Publication types (Num. hits)
article(2504) book(8) data(4) incollection(62) inproceedings(3886) phdthesis(73) proceedings(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1664 occurrences of 928 keywords

Results
Found 6558 publication records. Showing 6558 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Ratsameetip Wita, Nattanatch Jiamnapanon, Yunyong Teng-Amnuay An Ontology for Vulnerability Lifecycle. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Vulnerability lifecycle, Security related ontology, Risk prioritization, CVE, Security management
24Xiaoying Zhang, Chi Guo, Lina Wang Using Game Theory to Reveal Vulnerability for Complex Networks. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network immunization, game theory, complex networks, Monte Carlo sampling, network vulnerability
24Huning Dai, Christian Murphy, Gail E. Kaiser Configuration Fuzzing for Software Vulnerability Detection. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Configuration fuzzing, Fuzz testing, In Vivo testing, Security invariants, Vulnerability
24Ziyad S. Al-Salloum, Stephen D. Wolthusen Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Beneficial Computer Worms, Vulnerability Discovery, Self-replicating code
24Nuno Antunes, Marco Vieira Benchmarking Vulnerability Detection Tools for Web Services. Search on Bibsonomy ICWS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF vulnerability detection, security, web-services, benchmarking
24Ettore Bompard, Di Wu, Fei Xue The Concept of Betweenness in the Analysis of Power Grid Vulnerability. Search on Bibsonomy COMPENG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF electrical betweenness, complex networks, vulnerability, betweenness
24Sardaouna Hamadou, Vladimiro Sassone, Catuscia Palamidessi Reconciling Belief and Vulnerability in Information Flow. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF quantitative and probabilistic models, Security, uncertainty, information flow, accuracy, information hiding, vulnerability, belief, data confidentiality
24Yi Wang, Jinghua Xiao An Intelligent Model for Vulnerability Analysis Using Attack Graph. Search on Bibsonomy IFITA (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF vulnerability, intelligent, attack graph
24Lu Li, Zhihua Shi, Dun Zhu, Chongfa Cai, Tianwei Wang Regional Assessment of Eco-environmental Vulnerability Based on GIS - A Case Study of Hubei Province, China. Search on Bibsonomy ESIAT (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF eco-environment vulnerability, regional assessment, SPAC, Hubei Province, GIS
24Qingguo Li, Zhenmin Ma, Yunzhi Fang, Shouyu Chen Aquifer Vulnerability Assessment to Petroleum Contaminants Based on Fuzzy Variable Set Theory and Geographic Information System. Search on Bibsonomy ESIAT (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fuzzy variable set, aquifer, petroleum contamination, GIS, assessment, vulnerability
24Hiroyuki Okamura, Masataka Tokuzane, Tadashi Dohi Optimal Security Patch Release Timing under Non-homogeneous Vulnerability-Discovery Processes. Search on Bibsonomy ISSRE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF vulnerability-discovery process, non-homogeneous Poisson process, patch management
24Gang Zhao, Xiaohui Kuang, Weimin Zheng An Emulation Environment for Vulnerability Analysis of Large-Scale Distributed System. Search on Bibsonomy GCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Emulation Environment, Image Reload, Vulnerability Analysis, Topology Generation, Large-scale Distributed System
24Fang Yu 0001, Muath Alkhalaf, Tevfik Bultan Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses. Search on Bibsonomy ASE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF vulnerability signature, string analysis, finite automata, web security
24Clifford C. Juan, James Bret Michael, Christopher S. Eagle Vulnerability Analysis of HD Photo Image Viewer Applications. Search on Bibsonomy SSIRI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HD Photo, image viewer, security, testing, parser, vulnerability analysis, Fuzzing
24Antonio Bruno Della Rocca, Grazia Fattoruso, Sergio Lo Curzio, Francesco Pasanisi, Raffaele Pica, Alessandro Peloso, Maurizio Pollino, Carlo Tebano, Alfredo Trocciola, Davide De Chiara, Genoveffa Tortora SISI Project: Developing GIS-Based Tools for Vulnerability Assessment. Search on Bibsonomy VISUAL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Geoprocessing tools, GIS, Vulnerability Assessment
24Julien Budynek, Eric Bonabeau, Ben Shargel Evolving computer intrusion scripts for vulnerability assessment and log analysis. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF script kiddies, agent-based model, log analysis, hacker, vulnerability assessment
24Paul Ammann, Duminda Wijesekera, Saket Kaushik Scalable, graph-based network vulnerability analysis. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF monotonic analysis, model checking, scalability, network security, vulnerability, exploit
24John Viega, J. T. Bloch, Y. Kohno, Gary McGraw ITS4: A Static Vulnerability Scanner for C and C++ Code. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ITS4, static vulnerability scanner, C++ code, security-critical source code, real-time feedback, e-commerce software, software tools, security of data, software packages, software package, C language, software vulnerabilities, C++ language, C code
24Cynthia A. Phillips, Laura Painton Swiler A Graph-based System for Network-vulnerability Analysis. Search on Bibsonomy Workshop on New Security Paradigms The full citation details ... 1998 DBLP  DOI  BibTeX  RDF computer security, attack graph, network vulnerability
22Ju An Wang, Hao Wang, Minzhe Guo, Min Xia 0004 Security metrics for software systems. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software quality, software security, security metrics, software vulnerabilities
22Daniel Lincke, Patrik Jansson, Marcin Zalewski, Cezar Ionescu Generic Libraries in C++ with Concepts from High-Level Domain Descriptions in Haskell. Search on Bibsonomy DSL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Guiomar Corral, Eva Armengol, Albert Fornells-Herrera, Elisabet Golobardes Data Security Analysis Using Unsupervised Learning and Explanations. Search on Bibsonomy Innovations in Hybrid Intelligent Systems The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Clustering, Network Security, Unsupervised Learning, Explanations
22Adam Barth, Collin Jackson, John C. Mitchell Robust defenses for cross-site request forgery. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cross-site request forgery, http referer header, web application firewall, same-origin policy
22Wei Le, Mary Lou Soffa Marple: a demand-driven path-sensitive buffer overflow detector. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Elizabeth Fong, Romain Gaucher, Vadim Okun, Paul E. Black, Eric Dalci Building a Test Suite for Web Application Scanners. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Yonesy F. Nunez Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Xin Fu, Wangyuan Zhang, Tao Li 0006, José A. B. Fortes Optimizing Issue Queue Reliability to Soft Errors on Simultaneous Multithreaded Architectures. Search on Bibsonomy ICPP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22James Walden Integrating web application security into the IT curriculum. Search on Bibsonomy SIGITE Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web security education, web application security
22Stephan Neuhaus, Thomas Zimmermann 0001, Christian Holler, Andreas Zeller Predicting vulnerable software components. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF prediction, software security
22Idongesit Mkpong-Ruffin, David A. Umphress, John Hamilton, Juan E. Gilbert Quantitative software security risk assessment model. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quantitative risk assessment, empirical software engineering, software security
22K. Sivakumar, K. Garg Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure code, PHP Vulnerabilities, CWE, CVE, Web Security, XSS
22Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata A New Approach to Early Detection of an Unknown Worm. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Vilas Sridharan, Hossein Asadi 0001, Mehdi Baradaran Tahoori, David R. Kaeli Reducing Data Cache Susceptibility to Soft Errors. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF refresh, refetch, Fault tolerance, reliability, cache memories, soft errors, error modeling
22Yohann Thomas, Hervé Debar, Benjamin Morin Improving Security Management through Passive Network Observation. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu 0001, Nael B. Abu-Ghazaleh An application-driven perspective on wireless sensor network security. Search on Bibsonomy Q2SWinet The full citation details ... 2006 DBLP  DOI  BibTeX  RDF application-driven perspective, security, sensor networks
22Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata Development of Security Scanner with High Portability and Usability. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Fabrizio Baiardi, Claudio Telmon A Theoretical Model for the Average Impact of Attacks on Billing Infrastructures. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Elias Levy Approaching Zero. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Il-Ahn Cheong, Yongmin Kim 0005, Minsoo Kim 0002, BongNam Noh The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Ronald A. Skoog, Nicholas Jasinski, Mark A. Shayman, Rana Ghahremanpour, Mehdi Kalantari Network management and control mechanisms to prevent maliciously induced network instability. Search on Bibsonomy NOMS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Markus Jakobsson, Susanne Wetzel Security Weaknesses in Bluetooth. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Petrisor Panaite, Andrzej Pelc Universally Fault-Tolerant Broadcasting in Trees. Search on Bibsonomy ICPADS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
22Kameswari Kotapati, Peng Liu 0005, Thomas F. La Porta Evaluating MAPSec by marking attack graphs. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security protocol evaluation, MAPSec evaluation, eCAT, Mobile telecommunication networks, Attack graphs, Vulnerability assessment
22Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax Fortifying the dalì attack on digital signature. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF E-signature, digital signature, vulnerability analysis
22Luigi Coppolino, Salvatore D'Antonio, Ivano Alessandro Elia, Luigi Romano From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. Search on Bibsonomy SEUS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Intrusion Detection and Diagnosis, Information Diversity, Stealthy and non-vulnerability attacks, Ontologies
22Prateek Saxena, Pongsin Poosankam, Stephen McCamant, Dawn Song Loop-extended symbolic execution on binary programs. Search on Bibsonomy ISSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF loop summaries, vulnerability discovery and diagnosis
22Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 Vigilante: End-to-end containment of Internet worm epidemics. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-certifying alerts, vulnerability condition slicing, program analysis, dynamic data-flow analysis, Worm containment
22Qiang Qiang, Anna Nagurney A unified network performance measure with importance identification and the ranking of network components. Search on Bibsonomy Optim. Lett. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network efficiency measure, Network component importance ranking, Network equilibrium problems, Network performance, Network vulnerability
22Anna Nagurney, Qiang Qiang A network efficiency measure with application to critical infrastructure networks. Search on Bibsonomy J. Glob. Optim. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network efficiency measure, Network component importance ranking, Braess Paradox, Electric power supply chain networks, Infrastructure networks, Internet, Transportation networks, Critical infrastructure protection, Network vulnerability
22Sourour Meharouech, Adel Bouhoula, Tarek Abbes Collaboration between Security Devices toward improving Network Defense. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collaboration between Security Devices, vulnerability scanner, Network Security, Firewall, Honeypot, IPS
22Scott O'Hare, Steven Noel, Kenneth Prole A Graph-Theoretic Visualization Approach to Network Risk Analysis. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF exploit analysis, visualization, network security, situational awareness, attack graph, vulnerability assessment
22K. R. Jayaram, Aditya P. Mathur On the Adequacy of Statecharts as a Source of Tests for Cryptographic Protocols. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF TLS protocol, MC/DC coverage, Security protocol, Statechart, Security Vulnerability
22Sheraz Naseer, Muhammad Younus, Attiq Ahmed Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IEEE 802.16e security, Multi- and broadcast service shared key vulnerability, WiMAX, DoS Attacks
22Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Toward measuring network security using attack graphs. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion detection, security metrics, attack graphs, vulnerability analysis
22Robert K. Cunningham, Steven Cheung, Martin W. Fong, Ulf Lindqvist, David M. Nicol, Ronald Pawlowski, Eric Robinson, William H. Sanders, Sankalp Singh, Alfonso Valdes, Bradley Woodworth, Michael Zhivich Securing Current and Future Process Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure platforms, vulnerability testing, access control, intrusion detection, Process control systems
22Yutaka Oiwa, Kazukuni Kobara, Hajime Watanabe A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF List of Keywords vulnerability, certificate verification, attacks
22Joseph E. Lake, Robert L. Sanders Force on force simulation that provides facility stability analysis. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF facility analysis, facility vulnerability, force on force simulation, gaming technology, security training
22Ismail Kadayif, Mahmut T. Kandemir Modeling and improving data cache reliability. Search on Bibsonomy SIGMETRICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vulnerability factors, reliability, data integrity, soft errors, data caches
22Karl Chen, David A. Wagner 0001 Large-scale analysis of format string vulnerabilities in Debian Linux. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF format string vulnerability, large-scale analysis, type-qualifier inference
22Anthony Akins, Radu State Bookshelf. Search on Bibsonomy IEEE Softw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtual machines, virtualization, software, software security, software requirements, software management, software vulnerability, programming code
22Igor V. Kotenko, Mikhail Stepashkin Attack Graph Based Evaluation of Network Security. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network security, Risk Assessment, Security Metrics, Vulnerability Assessment, Network attacks
22Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli Assessing the Risk of an Information Infrastructure Through Security Dependencies. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mitigation plan, ranking, risk assessment, vulnerability, countermeasure
22Per Mellstrand, Rune Gustavsson Experiment Based Validation of CIIP. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Resilient Software, Critical Infrastructures, Vulnerability Assessment
22Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna Static Detection of Vulnerabilities in x86 Executables. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binary static analysis, symbolic execution, Vulnerability analysis, taint analysis
22Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi NetGlean: A Methodology for Distributed Network Security Scanning. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Operating system detection, network scanning, host discovery, vulnerability analysis
22Hågen Hasle, Yngve Kristiansen, Ketil Kintel, Einar Snekkenes Measuring Resistance to Social Engineering. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Information security, Security metrics, Security testing, Vulnerability analysis, Social engineering
22Michael McIntosh, Paula Austel XML signature element wrapping attacks and countermeasures. Search on Bibsonomy SWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security policy, attack, vulnerability, web services security, countermeasure, XML signature
22HyungJong Kim 0002, Joonmo Kim, Kang Shin Lee, Hongsub Lee, Tae Ho Cho Simulation-Based Security Testing for Continuity of Essential Service. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Service Continuity, Experimental Frame, Availability, Survivability, Vulnerability, Security Testing
22Alain J. Mayer, Avishai Wool, Elisha Ziskind Fang: A Firewall Analysis Engine. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Vulnerability Testing, Network Security, Firewall
22Ching-Hwa Cheng, Shih-Chieh Chang, Jinn-Shyan Wang, Wen-Ben Jone Charge Sharing Fault Detection for CMOS Domino Logic Circuits. Search on Bibsonomy DFT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF charge sharing, cs-vulnerability, pseudo gate, ATPG, domino circuit
22Geoffrey C. Sauerborn The Distributed Interactive Simulation (DIS) Lethality Communication Server. Search on Bibsonomy DIS-RT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF VV&A, Lethality, real-time, HLA, Vulnerability, Distributed Interactive Simulation, DIS
22Bruce Schneier, Chris Hall An Improved E-Mail Security Protocol. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy
22Ding-Zhu Du, Yuh-Dauh Lyuu, D. Frank Hsu Line Digraph Iterations and Spread Concept - with Application to Graph Theory, Fault Tolerance, and Routing. Search on Bibsonomy WG The full citation details ... 1991 DBLP  DOI  BibTeX  RDF line digraph iteration, diameter vulnerability, k-diameter, fault tolerance, graph, connectivity, container, de Bruijn graph, spread, Kautz graph
19Xiaobing Sun 0001, Lili Li, Lili Bo, Xiaojun Wu 0001, Ying Wei, Bin Li 0006 Automatic software vulnerability classification by extracting vulnerability triggers. Search on Bibsonomy J. Softw. Evol. Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Yulin Zhang, Yong Hu, Xiao Chen Context and Multi-Features-Based Vulnerability Detection: A Vulnerability Detection Frame Based on Context Slicing and Multi-Features. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
19Yinghui Wang, Bin Yu, Haiyang Yu, Lingyun Xiao, Haojie Ji, Yanan Zhao Automotive Cybersecurity Vulnerability Assessment Using the Common Vulnerability Scoring System and Bayesian Network Model. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Koen van Hove, Jeroen van der Ham-de Vos, Roland van Rijswijk-Deij Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Mark-Oliver Stehr, Minyoung Kim Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Xiaobing Sun 0001, Zhenlei Ye, Lili Bo, Xiaoxue Wu, Ying Wei, Tao Zhang 0001, Bin Li 0006 Automatic software vulnerability assessment by extracting vulnerability elements. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Yukun Dong, Yeer Tang, Xiaotong Cheng, Yufei Yang DeKeDVer: A deep learning-based multi-type software vulnerability classification framework using vulnerability description and source code. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jinfu Chen 0001, Chi Zhang 0046, Saihua Cai, Lin Zhang, Liang Ma A memory-related vulnerability detection approach based on vulnerability model with Petri Net. Search on Bibsonomy J. Log. Algebraic Methods Program. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Ridhi Jain, Nicole Gervasoni, Mthandazo Ndhlovu, Sanjay Rawat 0001 A Code Centric Evaluation of C/C++ Vulnerability Datasets for Deep Learning Based Vulnerability Detection Techniques. Search on Bibsonomy ISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Luca Piras 0003, Andrei Petrovski 0001 Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models. Search on Bibsonomy SECRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Xiangwei Li, Xiaoning Ren, Yinxing Xue, Zhenchang Xing, Jiamou Sun Prediction of Vulnerability Characteristics Based on Vulnerability Description and Prompt Learning. Search on Bibsonomy SANER The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Agrim Sachdeva, Ben Lazarine, Hongyi Zhu, Sagar Samtani User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach: Vulnerability Introduction Prediction in Social Coding Repositories. Search on Bibsonomy CSET @ USENIX Security Symposium The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Bozhi Wu, Shangqing Liu, Yang Xiao, Zhiming Li, Jun Sun 0001, Shang-Wei Lin 0001 Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Weiwei Wang, Zidong Li, Feng You, Ruilian Zhao Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications. Search on Bibsonomy SETTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Kelsey R. Fulton, Samantha Katcher, Kevin Song, Marshini Chetty, Michelle L. Mazurek, Chloé Messdaghi, Daniel Votipka Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Jiamou Sun, Zhenchang Xing, Qinghua Lu 0001, Xiwei Xu 0001, Liming Zhu 0001 A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph. Search on Bibsonomy ICSE Companion The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Gewangzi Du, Liwei Chen, Tongshuai Wu, Chenguang Zhu, Gang Shi Identify Vulnerability Types: A Cross-Project Multiclass Vulnerability Classification System Based on Deep Domain Adaptation. Search on Bibsonomy ICONIP (6) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
19Sicheng Wei, Yueting Yang, Kaiwei Li, Ying Guo, Jiquan Zhang Three-Dimensional Vulnerability Assessment of Peanut (Arachis hypogaea) Based on Comprehensive Drought Index and Vulnerability Surface: A Case Study of Shandong Province, China. Search on Bibsonomy Remote. Sens. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Lingpeng Meng, Xiaobo Yao, Qian Chen 0016, Chuanfeng Han Vulnerability cloud: A novel approach to assess the vulnerability of critical infrastructure systems. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19John S. Seberger, Ike Obi, Mariem Loukil, William Liao, David J. Wild 0001, Sameer Patil Speculative Vulnerability: Uncovering the Temporalities of Vulnerability in People's Experiences of the Pandemic. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Lili Liu, Zhen Li 0027, Yu Wen, Penglong Chen Investigating the impact of vulnerability datasets on deep learning-based vulnerability detectors. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Abdullah M. Algarni The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks. Search on Bibsonomy Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Peiyang Jia, Chengwei Liu, Hongyu Sun, Chengyi Sun, Mianxue Gu, Yang Liu 0003, Yuqing Zhang 0001 Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Yuhao Lin, Ying Li, Mianxue Gu, Hongyu Sun, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang 0001 Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey. Search on Bibsonomy DSN Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Hongyu Yang, Haiyun Yang, Liang Zhang 0018, Xiang Cheng Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph. Search on Bibsonomy TrustCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Xiaofan Nie, Haolai Wei, Liwei Chen, Zhijie Zhang, Yuantong Zhang, Gang Shi MVDetecter: Vulnerability Primitive-based General Memory Vulnerability Detection. Search on Bibsonomy ISPA/BDCloud/SocialCom/SustainCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Jiamou Sun, Zhenchang Xing, Xiwei Xu 0001, Liming Zhu 0001, Qinghua Lu 0001 Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching. Search on Bibsonomy ICSME The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 6558 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license