|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1767 occurrences of 913 keywords
|
|
|
Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Pattaraporn Sangaroonsilp, Hoa Khanh Dam, Aditya Ghose |
On Privacy Weaknesses and Vulnerabilities in Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 45th IEEE/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023, pp. 1071-1083, 2023, IEEE, 978-1-6654-5701-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie A. Williams |
Do Software Security Practices Yield Fewer Vulnerabilities? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE-SEIP ![In: 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, SEIP@ICSE 2023, Melbourne, Australia, May 14-20, 2023, pp. 292-303, 2023, IEEE, 979-8-3503-0037-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Kedi Shen, Yun Zhang, Lingfeng Bao, Zhiyuan Wan, Zhuorong Li, Minghui Wu 0001 |
Patchmatch: A Tool for Locating Patches of Open Source Project Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, Melbourne, Australia, May 14-20, 2023, pp. 175-179, 2023, IEEE, 979-8-3503-2263-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Christian Clay, Mohammad Khan, Biju Bajracharya |
A Look into the Vulnerabilities of Automatic Dependent Surveillance-Broadcast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 13th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2023, Las Vegas, NV, USA, March 8-11, 2023, pp. 933-938, 2023, IEEE, 979-8-3503-3286-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xueyan Tang, Yuying Du, Zhengyang Wang, Shawn Chong |
EIP Security Analysis: Application Program Standards, Attack Events, and Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EITCE ![In: Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, EITCE 2023, Xiamen, China, October 20-22, 2023, pp. 1239-1244, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sharmin Akter Mim, Roksana Rahman, Md. Rashid Al Asif, Khondokar Fida Hasan, Rahamatullah Khondoker |
Cybersecurity Attacks and Vulnerabilities During COVID-19. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (3) ![In: Advanced Information Networking and Applications - Proceedings of the 37th International Conference on Advanced Information Networking and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023, Volume 3, pp. 532-545, 2023, Springer, 978-3-031-28693-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Adhishree Kathikar, Aishwarya Nair, Ben Lazarine, Agrim Sachdeva, Sagar Samtani |
Assessing the Vulnerabilities of the Open-Source Artificial Intelligence (AI) Landscape: A Large-Scale Analysis of the Hugging Face Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2023, Charlotte, NC, USA, October 2-3, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-3773-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | George Chalhoub, Andrew Martin 0002 |
But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroUSEC ![In: Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023, pp. 277-295, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Nitin Kumar Tyagi, Mukta Goyal |
Investigating Security Vulnerabilities and Tools of Blockchain Smart Contract: A Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3 ![In: Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, IC3-2023, Noida, India, August 3-5, 2023, pp. 616-622, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ala Mughaid, Ibrahim Obeidat, Andaleeb Shdaifat, Razan Alhayjna, Shadi AlZu'bi |
Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMEC ![In: Eighth International Conference on Fog and Mobile Edge Computing, FMEC 2023, Tartu, Estonia, September 18-20, 2023, pp. 123-127, 2023, IEEE, 979-8-3503-1697-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chia-Cheng Tsai, Cheng-Chieh Lin, Shih-Wei Liao |
Unveiling Vulnerabilities in DAO: A Comprehensive Security Analysis and Protective Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain ![In: IEEE International Conference on Blockchain, Blockchain 2023, Danzhou, China, December 17-21, 2023, pp. 151-158, 2023, IEEE, 979-8-3503-1929-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Fidan Bozkurt, Mustafa Kara, Muhammed Ali Aydin, Hasan Hüseyin Balik |
Exploring the Vulnerabilities and Countermeasures of SSL/TLS Protocols in Secure Data Transmission Over Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2023, Dortmund, Germany, September 7-9, 2023, pp. 400-407, 2023, IEEE, 979-8-3503-5805-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Oles Yudin, Vyacheslav Kharchenko, Vladimir Pevnev |
Scanning of Web-Applications: Algorithms and Software for Search of Vulnerabilities "Code Injection" and "Insecure Design". ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2023, Dortmund, Germany, September 7-9, 2023, pp. 1005-1010, 2023, IEEE, 979-8-3503-5805-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Oleksii Neretin, Vyacheslav Kharchenko, Herman Fesenko |
Multi-source Analysis of AI Vulnerabilities: Methodology and Algorithms of Data Collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2023, Dortmund, Germany, September 7-9, 2023, pp. 972-977, 2023, IEEE, 979-8-3503-5805-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | David Reid, Kristiina Rahkema, James Walden |
Large Scale Study of Orphan Vulnerabilities in the Software Supply Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROMISE ![In: Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering, PROMISE 2023, San Francisco, CA, USA, 8 December 2023, pp. 22-32, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Marija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan, Davor Svetinovic |
Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC/PiCom/CBDCom/CyberSciTech ![In: IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates, November 14-17, 2023, pp. 784-791, 2023, IEEE, 979-8-3503-0460-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Giuseppe Beltrano, Claudia Greco, Michele Ianni, Giancarlo Fortino |
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC/PiCom/CBDCom/CyberSciTech ![In: IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates, November 14-17, 2023, pp. 916-920, 2023, IEEE, 979-8-3503-0460-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jorge Martins, Ibéria Medeiros, Bernardo Ferreira |
Code Privacy in Detection of Web Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EASE ![In: Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, EASE 2023, Oulu, Finland, June 14-16, 2023, pp. 265-266, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Alberto Schiaffino, Matteo Reina, Ricardo Anibal Matamoros Aragon, Alessandro Solinas, Francesco Epifania |
Detecting Zero-Day Vulnerabilities in CMS Platforms: An In-depth Analysis Using DeepLog. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIABI@AI*IA ![In: Proceedings of the 3rd Italian Workshop on Artificial Intelligence and Applications for Business and Industries (AIABI 2023) co-located with 22nd International Conference of the Italian Association for Artificial Intelligence (AI*IA 2023), Rome, Italy, November 9th, 2023., 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Nima Shiri Harzevili, Jiho Shin, Junjie Wang 0001, Song Wang 0009, Nachiappan Nagappan |
Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: 20th IEEE/ACM International Conference on Mining Software Repositories, MSR 2023, Melbourne, Australia, May 15-16, 2023, pp. 27-38, 2023, IEEE, 979-8-3503-1184-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yuyang Han, Xu Ji, Zhiqiang Wang 0006, Jianyi Zhang |
Systematic Analysis of Security and Vulnerabilities in Miniapps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SaTS@CCS ![In: Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, SaTS 2023, Copenhagen, Denmark, 26 November 2023, pp. 1-9, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jianjia Yu, Zifeng Kang, Yinzhi Cao |
MiniTaintDev: Unveiling Mini-App Vulnerabilities through Dynamic Taint Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SaTS@CCS ![In: Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, SaTS 2023, Copenhagen, Denmark, 26 November 2023, pp. 41-45, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Karan Bhanot, Ioana Baldini, Dennis Wei, Jiaming Zeng, Kristin P. Bennett |
Stress-Testing Bias Mitigation Algorithms to Understand Fairness Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIES ![In: Proceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society, AIES 2023, Montréal, QC, Canada, August 8-10, 2023, pp. 764-774, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Matteo Esposito, Sergio Moreschini, Valentina Lenarduzzi, David Hästbacka, Davide Falessi |
Can We Trust the Default Vulnerabilities Severity? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 23rd IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2023, Bogotá, Colombia, October 2-3, 2023, pp. 265-270, 2023, IEEE, 979-8-3503-0506-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Wenbo Ding, Song Liao, Keyan Guo, Fuqiang Zhang, Long Cheng 0005, Ziming Zhao 0001, Hongxin Hu |
Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartSP ![In: Security and Privacy in Cyber-Physical Systems and Smart Vehicles - First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings, pp. 3-14, 2023, Springer, 978-3-031-51629-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jiaqi He, Revan MacQueen, Natalie Bombardieri, Karim Ali 0001, James R. Wright, Cristina Cifuentes |
Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSME ![In: IEEE International Conference on Software Maintenance and Evolution, ICSME 2023, Bogotá, Colombia, October 1-6, 2023, pp. 463-473, 2023, IEEE, 979-8-3503-2783-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Venkata Venugopal Rao Gudlur |
Fintech Future Business & Cyber Vulnerabilities and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSECS ![In: 8th IEEE International Conference On Software Engineering and Computer Systems, ICSECS 2023, Penang, Malaysia, August 25-27, 2023, pp. 1-4, 2023, IEEE, 979-8-3503-1093-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Kobra Khanmohammadi, Raphaël Khoury |
Half-Day Vulnerabilities: A study of the First Days of CVE Entries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAMLIS ![In: Proceedings of the Conference on Applied Machine Learning in Information Security, Arlington, Virginia, USA, October 19-20, 2023., pp. 152-180, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Pingyan Wang, Shaoying Liu |
Detecting Security Vulnerabilities in Human-Machine Pair Programming with Pointer Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 27th International Conference on Engineering of Complex Computer Systems, ICECCS 2023, Toulouse, France, June 14-16, 2023, pp. 152-156, 2023, IEEE, 979-8-3503-4004-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Wenlin Xu, Tong Li 0004, Jinsong Wang, Tao Fu, Yahui Tang |
Detecting Software Vulnerabilities Based on Hierarchical Graph Attention Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICAI (2) ![In: Artificial Intelligence - Third CAAI International Conference, CICAI 2023, Fuzhou, China, July 22-23, 2023, Revised Selected Papers, Part II, pp. 113-124, 2023, Springer, 978-981-99-9118-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang 0017, Hongxin Hu, Ziming Zhao 0001 |
Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: 60th ACM/IEEE Design Automation Conference, DAC 2023, San Francisco, CA, USA, July 9-13, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-2348-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chang Liu, Yongqiang Lyu 0001, Haixia Wang 0001, Pengfei Qiu, Dapeng Ju, Gang Qu 0001, Dongsheng Wang 0002 |
Leaky MDU: ARM Memory Disambiguation Unit Uncovered and Vulnerabilities Exposed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: 60th ACM/IEEE Design Automation Conference, DAC 2023, San Francisco, CA, USA, July 9-13, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-2348-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Gaku Tatebatake, Shingo Yamaguchi |
Network Hardening Method by Cutting and Re-Linking Based on Exclusive Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCCE ![In: 12th IEEE Global Conference on Consumer Electronics, GCCE 2023, Nara, Japan, October 10-13, 2023, pp. 1002-1006, 2023, IEEE, 979-8-3503-4018-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus, Aylin Yener |
Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISS ![In: 57th Annual Conference on Information Sciences and Systems, CISS 2023, Baltimore, MD, USA, March 22-24, 2023, pp. 1-6, 2023, IEEE, 978-1-6654-5181-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Lyracelle Acosta, Seyed Ebrahim Hosseini, Shahbaz Pervez |
Ethical Challenges Associated with Security Vulnerabilities and Data Privacy in Social Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DeSE ![In: 16th International Conference on Developments in eSystems Engineering, DeSE 2023, Istanbul, Turkiye, December 18-20, 2023, pp. 647-652, 2023, IEEE, 979-8-3503-8134-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sri Hrushikesh Varma Bhupathiraju, Jennifer Sheldon, Luke A. Bauer, Vincent Bindschaedler, Takeshi Sugawara 0001, Sara Rampazzi |
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023, pp. 329-340, 2023, ACM, 978-1-4503-9859-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Aysegul Bumin, Megan Shah, Kejun Huang, Tamer Kahveci |
Vulture: VULnerabilities in impuTing drUg REsistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCB ![In: Proceedings of the 14th ACM International Conference on Bioinformatics, Computational Biology, and Health Informatics, BCB 2023, Houston, TX, USA, September 3-6, 2023, pp. 56:1-56:6, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xin Sun, Zixiang Wang |
Intelligent Association of CVE Vulnerabilities Based on Chain Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAIBDA ![In: Advances in Artificial Intelligence, Big Data and Algorithms - Proceedings of the 3rd International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA 2023) - 16-18 June 2023, Zhengzhou, China, pp. 28-34, 2023, IOS Press, 978-1-64368-444-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sajath Sathar, Saif Al-Kuwari, Abdullatif Albaseer, Marwa K. Qaraqe, Mohamed Abdallah 0001 |
Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM Autoencoder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNCC ![In: International Symposium on Networks, Computers and Communications, ISNCC 2023, Doha, Qatar, October 23-26, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-3559-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mst. Shapna Akter, Hossain Shahriar, Iysa Iqbal, Md Faruque Hossain, M. A. Karim, Victor Clincy, Razvan Voicu |
Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks Using a Malware Dataset: A Comparative Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSE ![In: IEEE International Conference on Software Services Engineering, SSE 2023, Chicago, IL, USA, July 2-8, 2023, pp. 222-231, 2023, IEEE, 979-8-3503-4075-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Abhishek Kumar Mishra |
Revealing and exploiting privacy vulnerabilities in users' public wireless packets. (Révéler et exploiter les vulnérabilités liées à confidentialité dans les paquets sans fil publics des utilisateurs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
11 | Sanjay Kariyappa |
Understanding and Mitigating Privacy Vulnerabilities in Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
11 | Rongze Xu, Zhanyong Tang, Guixin Ye, Huanting Wang, Xin Ke, Dingyi Fang, Zheng Wang 0001 |
Detecting code vulnerabilities by learning from large-scale open source repositories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 69, pp. 103293, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Jaimandeep Singh, Naveen Kumar Chaudhary |
OAuth 2.0 : Architectural design augmentation for mitigation of common security vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 65, pp. 103091, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Shailendra Mishra |
Cyber-security threats and vulnerabilities in 4G/5G network enabled systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Sci. Eng. ![In: Int. J. Comput. Sci. Eng. 25(5), pp. 548-561, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | F. Aktürk, F. Aras, S. Çeribasi |
Dynamic Response and Seismic Vulnerabilities of the Historic Tophane-i Amire: Dynamic and Seismic Analysis of a Historic Masonry Building. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Journal on Computing and Cultural Heritage ![In: ACM Journal on Computing and Cultural Heritage 15(3), pp. 52:1-52:20, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Pablo José Hueros-Barrios, Francisco Javier Rodríguez Sanchez, Pedro Martín, Carlos Jiménez, Ignacio Fernández |
Addressing the cybersecurity vulnerabilities of advanced nanogrids: A practical framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 20, pp. 100620, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Kristin Barber, Moein Ghaniyoun, Yinqian Zhang, Radu Teodorescu |
A Pre-Silicon Approach to Discovering Microarchitectural Vulnerabilities in Security Critical Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Comput. Archit. Lett. ![In: IEEE Comput. Archit. Lett. 21(1), pp. 9-12, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Marc Rennhard, Malte Kushnir, Olivier Favre, Damiano Esposito, Valentin Zahnd |
Automating the Detection of Access Control Vulnerabilities in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 3(5), pp. 376, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab |
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 21(1), pp. 115-158, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Gurpreet Kaur, Rekha Agarwal, Vinod Patidar |
Image encryption using fractional integral transforms: Vulnerabilities, threats, and future scope. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Appl. Math. Stat. ![In: Frontiers Appl. Math. Stat. 8, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson 0002, Engin Kirda, Manuel Egele |
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 25(4), pp. 33:1-33:35, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch 0001 |
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 25(1), pp. 4:1-4:28, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes, Christos D. Zaroliagis |
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 6(4), pp. 53, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Jiadong Lu, Fangming Gu, Yiqi Wang, Jiahui Chen 0002, Zhiniang Peng, Sheng Wen |
Static Detection of File Access Control Vulnerabilities on Windows System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 34(16), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Ibéria Medeiros, Nuno Neves 0001, Miguel Correia 0001 |
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 71(2), pp. 1033-1056, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Bixin Li, Zhenyu Pan, Tianyuan Hu |
ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 71(2), pp. 984-999, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani |
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC Int. J. Inf. Secur. ![In: ISC Int. J. Inf. Secur. 14(3), pp. 61-69, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Ahmed Zerouali, Tom Mens, Alexandre Decan, Coen De Roover |
On the impact of security vulnerabilities in the npm and RubyGems dependency networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 27(5), pp. 107, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie A. Williams |
Do I really need all this work to find vulnerabilities? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 27(6), pp. 154, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Haozhe Zhou, Amin Milani Fard, Adetokunbo Makanju |
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. Priv. ![In: J. Cybersecur. Priv. 2(2), pp. 358-378, May 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Andrea Lisi, Prateeti Mukherjee, Laura De Santis, Lei Wu, Dmitrij Lagutin, Yki Kortesniemi |
Automated Responsible Disclosure of Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 10472-10489, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, P. Venkat Rangan |
Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 12345-12364, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Fatimah K. Aljaafari, Rafael Menezes, Edoardo Manino, Fedor Shmarov, Mustafa A. Mustafa, Lucas C. Cordeiro |
Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 121365-121384, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis |
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 104671-104685, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Mikhail Zolotukhin, Parsa Miraghaei, Di Zhang 0004, Timo Hämäläinen 0002 |
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 126285-126303, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Raghavendra Rao Althar, Debabrata Samanta, Manjit Kaur, Dilbag Singh, Heung-No Lee |
Automated Risk Management Based Software Security Vulnerabilities Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 90597-90608, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Razvan Raducu, Ricardo J. Rodríguez, Pedro Álvarez 0001 |
Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 21742-21758, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Satpal Singh Kushwaha, Sandeep Joshi, Dilbag Singh, Manjit Kaur, Heung-No Lee |
Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 6605-6621, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Daojing He, Xiaohu Yu, Tinghui Li, Sammy Chan, Mohsen Guizani |
Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(17), pp. 16438-16445, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Fadhila Tlili, Lamia Chaari Fourati, Samiha Ayed, Bassem Ouni |
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 129, pp. 102805, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sandeep Kautish, A. Reyana, Ankit Vidyarthi |
SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 18(9), pp. 6455-6463, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Pooja Anand, Yashwant Singh, Arvind Kumar Selwal, Pradeep Kumar Singh 0001, Kayhan Zrar Ghafoor |
IVQFIoT: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. J. Knowl. Eng. ![In: Expert Syst. J. Knowl. Eng. 39(5), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Kavita Sharma 0001 |
Internet of healthcare things security vulnerabilities and jamming attack analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. J. Knowl. Eng. ![In: Expert Syst. J. Knowl. Eng. 39(3), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Francesca Righetti, Carlo Vallati, Marco Tiloca, Giuseppe Anastasi |
Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 194, pp. 411-432, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Samuele Germiniani, Alessandro Danese, Graziano Pravadelli |
Automatic Generation of Assertions for Detection of Firmware Vulnerabilities Through Alignment of Symbolic Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Emerg. Top. Comput. ![In: IEEE Trans. Emerg. Top. Comput. 10(2), pp. 728-739, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Shubham Rai, Satwik Patnaik, Ansh Rupani, Johann Knechtel, Ozgur Sinanoglu, Akash Kumar 0001 |
Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Emerg. Top. Comput. ![In: IEEE Trans. Emerg. Top. Comput. 10(2), pp. 763-778, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Blazhe Gjorgiev, Giovanni Sansavini |
Identifying and assessing power system vulnerabilities to transmission asset outages via cascading failure analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reliab. Eng. Syst. Saf. ![In: Reliab. Eng. Syst. Saf. 217, pp. 108085, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Wei Wang 0279, Gregorio Cova, Enrico Zio |
A clustering-based framework for searching vulnerabilities in the operation dynamics of Cyber-Physical Energy Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Reliab. Eng. Syst. Saf. ![In: Reliab. Eng. Syst. Saf. 222, pp. 108400, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Jun Yang, Leixiong Huang, Haoming Ma, Zhihui Xu, Ming Yang, Shaoqiang Guo |
A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructure Prot. ![In: Int. J. Crit. Infrastructure Prot. 38, pp. 100554, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Abdullah M. Algarni, Vijey Thayananthan |
Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 14(12), pp. 2494, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sundarakrishnan Ganesh, Francis Palma, Tobias Olsson |
Are Source Code Metrics "Good Enough" in Predicting Security Vulnerabilities? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data ![In: Data 7(9), pp. 127, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Alden Hilton, Joel Hirschmann, Casey T. Deccio |
Beware of IPs in Sheep's Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 30(4), pp. 1659-1673, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Chia-Cheng Yen, Dipak Ghosal, H. Michael Zhang, Chen-Nee Chuah |
Security Vulnerabilities and Protection Algorithms for Backpressure-Based Traffic Signal Control at an Isolated Intersection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 23(7), pp. 6406-6417, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sagar Samtani, Yidong Chai, Hsinchun Chen |
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIS Q. ![In: MIS Q. 46(2), pp. 911-946, May 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Azfar Khalid, Zeashan Hameed Khan, Muhammad Idrees, Pierre T. Kirisci, Zied Ghrairi, Klaus-Dieter Thoben, Jürgen Pannek |
Understanding vulnerabilities in cyber physical production systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Integr. Manuf. ![In: Int. J. Comput. Integr. Manuf. 35(6), pp. 569-582, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Yuze Wang, Peng Liu 0016, Weidong Wang, Xiaohang Wang 0001, Yingtao Jiang |
On a Consistency Testing Model and Strategy for Revealing RISC Processor's Dark Instructions and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 71(7), pp. 1586-1597, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Xingyu Meng, Shamik Kundu, Arun K. Kanuparthi, Kanad Basu |
RTL-ConTest: Concolic Testing on RTL for Detecting Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(3), pp. 466-477, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Faiq Khalid, Imran Hafeez Abbassi, Semeen Rehman, Awais Mehmood Kamboh, Osman Hasan, Muhammad Shafique 0001 |
ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(4), pp. 1167-1180, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Abdul Razaque, Syed Rizvi 0001, Meer Jaro Khan, Muder Almiani, Amer Al-Rahayfeh |
State-of-art review of information diffusion models and their impact on social network vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 34(1), pp. 1275-1294, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Abdalla Wasef Marashdih, Zarul Fitri Zaaba, Khaled Suwais |
Predicting input validation vulnerabilities based on minimal SSA features and machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B), pp. 9311-9331, November 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Roman V. Baev, Leonid V. Skvortsov, Evgeny A. Kudryashov, Ruben Buchatskiy, Roman Zhuykov |
Preventing Vulnerabilities Caused by Optimization of Code with Undefined Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Program. Comput. Softw. ![In: Program. Comput. Softw. 48(7), pp. 445-454, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Di Xiao, Hani Jieun Kim, Ignatius Pang, Pengyi Yang |
Functional analysis of the stable phosphoproteome reveals cancer vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bioinform. ![In: Bioinform. 38(7), pp. 1956-1963, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Yury V. Kosolapov |
Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. Control. Comput. Sci. ![In: Autom. Control. Comput. Sci. 56(7), pp. 828, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Wentao Wang 0003, Faryn Dumont, Nan Niu, Glen Horton |
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 48(5), pp. 1665-1675, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Fuchen Ma, Zhenyang Xu, Meng Ren, Zijing Yin, Yuanliang Chen, Lei Qiao, Bin Gu 0006, Huizhong Li, Yu Jiang 0001, Jia-Guang Sun 0001 |
Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 48(11), pp. 4380-4396, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Morteza Verdi, Ashkan Sami, Jafar Akhondali, Foutse Khomh, Gias Uddin 0001, Alireza Karami Motlagh |
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 48(5), pp. 1497-1514, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Zhen Huang 0002, Gang Tan, Xiaowei Yu |
Mitigating Vulnerabilities in Closed Source Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(30), pp. 4, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Nitin Pundir, Sohrab Aftabjahani, Rosario Cammarota, Mark M. Tehranipoor, Farimah Farahmandi |
Analyzing Security Vulnerabilities Induced by High-level Synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Emerg. Technol. Comput. Syst. ![In: ACM J. Emerg. Technol. Comput. Syst. 18(3), pp. 47:1-47:22, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sigi Goode, David Lacey |
Exploiting organisational vulnerabilities as dark knowledge: conceptual development from organisational fraud cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Knowl. Manag. ![In: J. Knowl. Manag. 26(6), pp. 1492-1515, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
|
|