The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for vulnerabilities with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1990 (15) 1991-1998 (23) 1999-2000 (28) 2001 (32) 2002 (54) 2003 (93) 2004 (127) 2005 (198) 2006 (187) 2007 (249) 2008 (268) 2009 (190) 2010 (99) 2011 (93) 2012 (94) 2013 (90) 2014 (107) 2015 (135) 2016 (160) 2017 (167) 2018 (198) 2019 (254) 2020 (247) 2021 (268) 2022 (331) 2023 (377) 2024 (94)
Publication types (Num. hits)
article(1313) book(3) data(2) incollection(22) inproceedings(2772) phdthesis(66)
Venues (Conferences, Journals, ...)
CoRR(393) CCS(74) USENIX Security Symposium(66) ACSAC(53) ARES(44) Comput. Secur.(43) HICSS(41) IEEE Secur. Priv.(41) IEEE Access(37) DSN(34) AsiaCCS(32) NDSS(32) ICSE(27) ASE(26) SAC(26) RAID(23) More (+10 of total 1365)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1767 occurrences of 913 keywords

Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Pattaraporn Sangaroonsilp, Hoa Khanh Dam, Aditya Ghose On Privacy Weaknesses and Vulnerabilities in Software Systems. Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie A. Williams Do Software Security Practices Yield Fewer Vulnerabilities? Search on Bibsonomy ICSE-SEIP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kedi Shen, Yun Zhang, Lingfeng Bao, Zhiyuan Wan, Zhuorong Li, Minghui Wu 0001 Patchmatch: A Tool for Locating Patches of Open Source Project Vulnerabilities. Search on Bibsonomy ICSE Companion The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Christian Clay, Mohammad Khan, Biju Bajracharya A Look into the Vulnerabilities of Automatic Dependent Surveillance-Broadcast. Search on Bibsonomy CCWC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xueyan Tang, Yuying Du, Zhengyang Wang, Shawn Chong EIP Security Analysis: Application Program Standards, Attack Events, and Security Vulnerabilities. Search on Bibsonomy EITCE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sharmin Akter Mim, Roksana Rahman, Md. Rashid Al Asif, Khondokar Fida Hasan, Rahamatullah Khondoker Cybersecurity Attacks and Vulnerabilities During COVID-19. Search on Bibsonomy AINA (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Adhishree Kathikar, Aishwarya Nair, Ben Lazarine, Agrim Sachdeva, Sagar Samtani Assessing the Vulnerabilities of the Open-Source Artificial Intelligence (AI) Landscape: A Large-Scale Analysis of the Hugging Face Platform. Search on Bibsonomy ISI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11George Chalhoub, Andrew Martin 0002 But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers. Search on Bibsonomy EuroUSEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nitin Kumar Tyagi, Mukta Goyal Investigating Security Vulnerabilities and Tools of Blockchain Smart Contract: A Review. Search on Bibsonomy IC3 The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ala Mughaid, Ibrahim Obeidat, Andaleeb Shdaifat, Razan Alhayjna, Shadi AlZu'bi Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning. Search on Bibsonomy FMEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chia-Cheng Tsai, Cheng-Chieh Lin, Shih-Wei Liao Unveiling Vulnerabilities in DAO: A Comprehensive Security Analysis and Protective Framework. Search on Bibsonomy Blockchain The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Fidan Bozkurt, Mustafa Kara, Muhammed Ali Aydin, Hasan Hüseyin Balik Exploring the Vulnerabilities and Countermeasures of SSL/TLS Protocols in Secure Data Transmission Over Computer Networks. Search on Bibsonomy IDAACS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Oles Yudin, Vyacheslav Kharchenko, Vladimir Pevnev Scanning of Web-Applications: Algorithms and Software for Search of Vulnerabilities "Code Injection" and "Insecure Design". Search on Bibsonomy IDAACS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Oleksii Neretin, Vyacheslav Kharchenko, Herman Fesenko Multi-source Analysis of AI Vulnerabilities: Methodology and Algorithms of Data Collection. Search on Bibsonomy IDAACS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11David Reid, Kristiina Rahkema, James Walden Large Scale Study of Orphan Vulnerabilities in the Software Supply Chain. Search on Bibsonomy PROMISE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Marija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan, Davor Svetinovic Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Giuseppe Beltrano, Claudia Greco, Michele Ianni, Giancarlo Fortino Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications. Search on Bibsonomy DASC/PiCom/CBDCom/CyberSciTech The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jorge Martins, Ibéria Medeiros, Bernardo Ferreira Code Privacy in Detection of Web Vulnerabilities. Search on Bibsonomy EASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Alberto Schiaffino, Matteo Reina, Ricardo Anibal Matamoros Aragon, Alessandro Solinas, Francesco Epifania Detecting Zero-Day Vulnerabilities in CMS Platforms: An In-depth Analysis Using DeepLog. Search on Bibsonomy AIABI@AI*IA The full citation details ... 2023 DBLP  BibTeX  RDF
11Nima Shiri Harzevili, Jiho Shin, Junjie Wang 0001, Song Wang 0009, Nachiappan Nagappan Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries. Search on Bibsonomy MSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuyang Han, Xu Ji, Zhiqiang Wang 0006, Jianyi Zhang Systematic Analysis of Security and Vulnerabilities in Miniapps. Search on Bibsonomy SaTS@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jianjia Yu, Zifeng Kang, Yinzhi Cao MiniTaintDev: Unveiling Mini-App Vulnerabilities through Dynamic Taint Analysis. Search on Bibsonomy SaTS@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Karan Bhanot, Ioana Baldini, Dennis Wei, Jiaming Zeng, Kristin P. Bennett Stress-Testing Bias Mitigation Algorithms to Understand Fairness Vulnerabilities. Search on Bibsonomy AIES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Matteo Esposito, Sergio Moreschini, Valentina Lenarduzzi, David Hästbacka, Davide Falessi Can We Trust the Default Vulnerabilities Severity? Search on Bibsonomy SCAM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wenbo Ding, Song Liao, Keyan Guo, Fuqiang Zhang, Long Cheng 0005, Ziming Zhao 0001, Hongxin Hu Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles. Search on Bibsonomy SmartSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiaqi He, Revan MacQueen, Natalie Bombardieri, Karim Ali 0001, James R. Wright, Cristina Cifuentes Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities. Search on Bibsonomy ICSME The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Venkata Venugopal Rao Gudlur Fintech Future Business & Cyber Vulnerabilities and Challenges. Search on Bibsonomy ICSECS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kobra Khanmohammadi, Raphaël Khoury Half-Day Vulnerabilities: A study of the First Days of CVE Entries. Search on Bibsonomy CAMLIS The full citation details ... 2023 DBLP  BibTeX  RDF
11Pingyan Wang, Shaoying Liu Detecting Security Vulnerabilities in Human-Machine Pair Programming with Pointer Analysis. Search on Bibsonomy ICECCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wenlin Xu, Tong Li 0004, Jinsong Wang, Tao Fu, Yahui Tang Detecting Software Vulnerabilities Based on Hierarchical Graph Attention Network. Search on Bibsonomy CICAI (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang 0017, Hongxin Hu, Ziming Zhao 0001 Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense. Search on Bibsonomy DAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chang Liu, Yongqiang Lyu 0001, Haixia Wang 0001, Pengfei Qiu, Dapeng Ju, Gang Qu 0001, Dongsheng Wang 0002 Leaky MDU: ARM Memory Disambiguation Unit Uncovered and Vulnerabilities Exposed. Search on Bibsonomy DAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Gaku Tatebatake, Shingo Yamaguchi Network Hardening Method by Cutting and Re-Linking Based on Exclusive Vulnerabilities. Search on Bibsonomy GCCE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus, Aylin Yener Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks. Search on Bibsonomy CISS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lyracelle Acosta, Seyed Ebrahim Hosseini, Shahbaz Pervez Ethical Challenges Associated with Security Vulnerabilities and Data Privacy in Social Networking. Search on Bibsonomy DeSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sri Hrushikesh Varma Bhupathiraju, Jennifer Sheldon, Luke A. Bauer, Vincent Bindschaedler, Takeshi Sugawara 0001, Sara Rampazzi EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Aysegul Bumin, Megan Shah, Kejun Huang, Tamer Kahveci Vulture: VULnerabilities in impuTing drUg REsistance. Search on Bibsonomy BCB The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xin Sun, Zixiang Wang Intelligent Association of CVE Vulnerabilities Based on Chain Reasoning. Search on Bibsonomy CAIBDA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sajath Sathar, Saif Al-Kuwari, Abdullatif Albaseer, Marwa K. Qaraqe, Mohamed Abdallah 0001 Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM Autoencoder. Search on Bibsonomy ISNCC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mst. Shapna Akter, Hossain Shahriar, Iysa Iqbal, Md Faruque Hossain, M. A. Karim, Victor Clincy, Razvan Voicu Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks Using a Malware Dataset: A Comparative Analysis. Search on Bibsonomy SSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Abhishek Kumar Mishra Revealing and exploiting privacy vulnerabilities in users' public wireless packets. (Révéler et exploiter les vulnérabilités liées à confidentialité dans les paquets sans fil publics des utilisateurs). Search on Bibsonomy 2023   RDF
11Sanjay Kariyappa Understanding and Mitigating Privacy Vulnerabilities in Deep Learning. Search on Bibsonomy 2023   RDF
11Rongze Xu, Zhanyong Tang, Guixin Ye, Huanting Wang, Xin Ke, Dingyi Fang, Zheng Wang 0001 Detecting code vulnerabilities by learning from large-scale open source repositories. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Jaimandeep Singh, Naveen Kumar Chaudhary OAuth 2.0 : Architectural design augmentation for mitigation of common security vulnerabilities. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Shailendra Mishra Cyber-security threats and vulnerabilities in 4G/5G network enabled systems. Search on Bibsonomy Int. J. Comput. Sci. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11F. Aktürk, F. Aras, S. Çeribasi Dynamic Response and Seismic Vulnerabilities of the Historic Tophane-i Amire: Dynamic and Seismic Analysis of a Historic Masonry Building. Search on Bibsonomy ACM Journal on Computing and Cultural Heritage The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Pablo José Hueros-Barrios, Francisco Javier Rodríguez Sanchez, Pedro Martín, Carlos Jiménez, Ignacio Fernández Addressing the cybersecurity vulnerabilities of advanced nanogrids: A practical framework. Search on Bibsonomy Internet Things The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Kristin Barber, Moein Ghaniyoun, Yinqian Zhang, Radu Teodorescu A Pre-Silicon Approach to Discovering Microarchitectural Vulnerabilities in Security Critical Applications. Search on Bibsonomy IEEE Comput. Archit. Lett. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Marc Rennhard, Malte Kushnir, Olivier Favre, Damiano Esposito, Valentin Zahnd Automating the Detection of Access Control Vulnerabilities in Web Applications. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Gurpreet Kaur, Rekha Agarwal, Vinod Patidar Image encryption using fractional integral transforms: Vulnerabilities, threats, and future scope. Search on Bibsonomy Frontiers Appl. Math. Stat. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson 0002, Engin Kirda, Manuel Egele HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch 0001 Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes, Christos D. Zaroliagis WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations. Search on Bibsonomy Cryptogr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Jiadong Lu, Fangming Gu, Yiqi Wang, Jiahui Chen 0002, Zhiniang Peng, Sheng Wen Static Detection of File Access Control Vulnerabilities on Windows System. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Ibéria Medeiros, Nuno Neves 0001, Miguel Correia 0001 Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Bixin Li, Zhenyu Pan, Tianyuan Hu ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Ahmed Zerouali, Tom Mens, Alexandre Decan, Coen De Roover On the impact of security vulnerabilities in the npm and RubyGems dependency networks. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie A. Williams Do I really need all this work to find vulnerabilities? Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Haozhe Zhou, Amin Milani Fard, Adetokunbo Makanju The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Andrea Lisi, Prateeti Mukherjee, Laura De Santis, Lei Wu, Dmitrij Lagutin, Yki Kortesniemi Automated Responsible Disclosure of Security Vulnerabilities. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, P. Venkat Rangan Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Fatimah K. Aljaafari, Rafael Menezes, Edoardo Manino, Fedor Shmarov, Mustafa A. Mustafa, Lucas C. Cordeiro Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Mikhail Zolotukhin, Parsa Miraghaei, Di Zhang 0004, Timo Hämäläinen 0002 On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Raghavendra Rao Althar, Debabrata Samanta, Manjit Kaur, Dilbag Singh, Heung-No Lee Automated Risk Management Based Software Security Vulnerabilities Management. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Razvan Raducu, Ricardo J. Rodríguez, Pedro Álvarez 0001 Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Satpal Singh Kushwaha, Sandeep Joshi, Dilbag Singh, Manjit Kaur, Heung-No Lee Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Daojing He, Xiaohu Yu, Tinghui Li, Sammy Chan, Mohsen Guizani Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Fadhila Tlili, Lamia Chaari Fourati, Samiha Ayed, Bassem Ouni Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sandeep Kautish, A. Reyana, Ankit Vidyarthi SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Pooja Anand, Yashwant Singh, Arvind Kumar Selwal, Pradeep Kumar Singh 0001, Kayhan Zrar Ghafoor IVQFIoT: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities. Search on Bibsonomy Expert Syst. J. Knowl. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Kavita Sharma 0001 Internet of healthcare things security vulnerabilities and jamming attack analysis. Search on Bibsonomy Expert Syst. J. Knowl. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Francesca Righetti, Carlo Vallati, Marco Tiloca, Giuseppe Anastasi Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation. Search on Bibsonomy Comput. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Samuele Germiniani, Alessandro Danese, Graziano Pravadelli Automatic Generation of Assertions for Detection of Firmware Vulnerabilities Through Alignment of Symbolic Sequences. Search on Bibsonomy IEEE Trans. Emerg. Top. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Shubham Rai, Satwik Patnaik, Ansh Rupani, Johann Knechtel, Ozgur Sinanoglu, Akash Kumar 0001 Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits. Search on Bibsonomy IEEE Trans. Emerg. Top. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Blazhe Gjorgiev, Giovanni Sansavini Identifying and assessing power system vulnerabilities to transmission asset outages via cascading failure analysis. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Wei Wang 0279, Gregorio Cova, Enrico Zio A clustering-based framework for searching vulnerabilities in the operation dynamics of Cyber-Physical Energy Systems. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Jun Yang, Leixiong Huang, Haoming Ma, Zhihui Xu, Ming Yang, Shaoqiang Guo A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems. Search on Bibsonomy Int. J. Crit. Infrastructure Prot. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Abdullah M. Algarni, Vijey Thayananthan Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication. Search on Bibsonomy Symmetry The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sundarakrishnan Ganesh, Francis Palma, Tobias Olsson Are Source Code Metrics "Good Enough" in Predicting Security Vulnerabilities? Search on Bibsonomy Data The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Alden Hilton, Joel Hirschmann, Casey T. Deccio Beware of IPs in Sheep's Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Chia-Cheng Yen, Dipak Ghosal, H. Michael Zhang, Chen-Nee Chuah Security Vulnerabilities and Protection Algorithms for Backpressure-Based Traffic Signal Control at an Isolated Intersection. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sagar Samtani, Yidong Chai, Hsinchun Chen Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model. Search on Bibsonomy MIS Q. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Azfar Khalid, Zeashan Hameed Khan, Muhammad Idrees, Pierre T. Kirisci, Zied Ghrairi, Klaus-Dieter Thoben, Jürgen Pannek Understanding vulnerabilities in cyber physical production systems. Search on Bibsonomy Int. J. Comput. Integr. Manuf. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Yuze Wang, Peng Liu 0016, Weidong Wang, Xiaohang Wang 0001, Yingtao Jiang On a Consistency Testing Model and Strategy for Revealing RISC Processor's Dark Instructions and Vulnerabilities. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Xingyu Meng, Shamik Kundu, Arun K. Kanuparthi, Kanad Basu RTL-ConTest: Concolic Testing on RTL for Detecting Security Vulnerabilities. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Faiq Khalid, Imran Hafeez Abbassi, Semeen Rehman, Awais Mehmood Kamboh, Osman Hasan, Muhammad Shafique 0001 ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Abdul Razaque, Syed Rizvi 0001, Meer Jaro Khan, Muder Almiani, Amer Al-Rahayfeh State-of-art review of information diffusion models and their impact on social network vulnerabilities. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Abdalla Wasef Marashdih, Zarul Fitri Zaaba, Khaled Suwais Predicting input validation vulnerabilities based on minimal SSA features and machine learning. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Roman V. Baev, Leonid V. Skvortsov, Evgeny A. Kudryashov, Ruben Buchatskiy, Roman Zhuykov Preventing Vulnerabilities Caused by Optimization of Code with Undefined Behavior. Search on Bibsonomy Program. Comput. Softw. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Di Xiao, Hani Jieun Kim, Ignatius Pang, Pengyi Yang Functional analysis of the stable phosphoproteome reveals cancer vulnerabilities. Search on Bibsonomy Bioinform. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Yury V. Kosolapov Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Wentao Wang 0003, Faryn Dumont, Nan Niu, Glen Horton Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Fuchen Ma, Zhenyang Xu, Meng Ren, Zijing Yin, Yuanliang Chen, Lei Qiao, Bin Gu 0006, Huizhong Li, Yu Jiang 0001, Jia-Guang Sun 0001 Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Morteza Verdi, Ashkan Sami, Jafar Akhondali, Foutse Khomh, Gias Uddin 0001, Alireza Karami Motlagh An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Zhen Huang 0002, Gang Tan, Xiaowei Yu Mitigating Vulnerabilities in Closed Source Software. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Nitin Pundir, Sohrab Aftabjahani, Rosario Cammarota, Mark M. Tehranipoor, Farimah Farahmandi Analyzing Security Vulnerabilities Induced by High-level Synthesis. Search on Bibsonomy ACM J. Emerg. Technol. Comput. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Sigi Goode, David Lacey Exploiting organisational vulnerabilities as dark knowledge: conceptual development from organisational fraud cases. Search on Bibsonomy J. Knowl. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 4178 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license