|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1767 occurrences of 913 keywords
|
|
|
Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Peiqiang Li, Guojun Wang 0001, Xiaofei Xing, Xiangbin Li, Jinyao Zhu |
Detecting unknown vulnerabilities in smart contracts using opcode sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Connect. Sci. ![In: Connect. Sci. 36(1), 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Jie Su, Zhen Hong, Lei Ye, Tao Liu, Sizhuang Liang, Shouling Ji, Gagangeet Singh Aujla, Reheem Beyah, Zhenyu Wen |
Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 70(1), pp. 4605-4616, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Xiyang Wu, Ruiqi Xian, Tianrui Guan, Jing Liang 0006, Souradip Chakraborty, Fuxiao Liu, Brian M. Sadler, Dinesh Manocha, Amrit Singh Bedi |
On the Safety Concerns of Deploying LLMs/VLMs in Robotics: Highlighting the Risks and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.10340, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Marsalis T. Gibson, David Babazadeh, Claire J. Tomlin, Shankar Sastry 0001 |
Hacking Predictors Means Hacking Cars: Using Sensitivity Analysis to Identify Trajectory Prediction Vulnerabilities for Autonomous Driving Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.10313, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin 0001 |
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.09767, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Jai Prakash Veerla, Poojitha Thota, Partha Sai Guttikonda, Shirin Nilizadeh, Jacob M. Luber |
Vulnerabilities Unveiled: Adversarially Attacking a Multimodal Vision Language Model for Pathology Imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.02565, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Chenyu Zhang, Lanjun Wang, Anan Liu |
Revealing Vulnerabilities in Stable Diffusion via Targeted Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.08725, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti |
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.02983, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Berkay Berabi, Alexey Gronskiy, Veselin Raychev, Gishor Sivanrupan, Victor Chibotaru, Martin T. Vechev |
DeepCode AI Fix: Fixing Security Vulnerabilities with Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.13291, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits |
SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.15293, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Chen Wu, Xi Li, Jiaqi Wang |
Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.10375, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Chenxi Yang, Yujia Liu, Dingquan Li, Tingting Jiang 0001 |
Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.05217, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Steven Golob, Sikha Pentyala, Anuar Maratkhan, Martine De Cock |
High Epsilon Synthetic Data Vulnerabilities in MST and PrivBayes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.06699, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Somnath Banerjee, Sayan Layek, Rima Hazra, Animesh Mukherjee 0001 |
How (un)ethical are instruction-centric responses of LLMs? Unveiling the vulnerabilities of safety guardrails to harmful queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.15302, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sven Cattell, Avijit Ghosh |
Coordinated Disclosure for AI: Beyond Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.07039, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao 0001 |
A Repository-Level Dataset For Detecting, Classifying and Repairing Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.13169, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong |
Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.14977, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Yu Nong, Mohammed Aldeen, Long Cheng 0005, Hongxin Hu, Feng Chen, Haipeng Cai |
Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.17230, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Zexu Wang, Jiachi Chen, Yanlin Wang, Yu Zhang, Weizhe Zhang, Zibin Zheng |
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.11254, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Francesco Salzano, Simone Scalabrino, Rocco Oliveto, Remo Pareschi |
Fixing Smart Contract Vulnerabilities: A Comparative Analysis of Literature and Developer's Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.07458, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Shuai Zhao, Meihuizi Jia, Luu Anh Tuan, Jinming Wen |
Universal Vulnerabilities in Large Language Models: In-context Learning Backdoor Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.05949, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Mikhail Kazdagli, Mohit Tiwari, Akshat Kumar |
Leveraging AI Planning For Detecting Cloud Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.10985, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Wejdene Haouari, Abdelhakim Senhaji Hafid, Marios Fokaefs |
Vulnerabilities of smart contracts and mitigation schemes: A Comprehensive Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.19805, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Yifan Li 0009, Hangyu Guo, Kun Zhou 0002, Wayne Xin Zhao, Ji-Rong Wen |
Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking Multimodal Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.09792, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Jinchang Hu, Lyuye Zhang, Chengwei Liu, Sen Yang, Song Huang, Yang Liu |
Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.00515, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Triet H. M. Le, Xiaoning Du 0001, Muhammad Ali Babar 0001 |
Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.11105, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Jun-Jie Zhang 0001, Deyu Meng |
Quantum-Inspired Analysis of Neural Network Vulnerabilities: The Role of Conjugate Variables in System Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.10983, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, Francesco Buccafurri |
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.12184, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Xin-Cheng Wen, Cuiyun Gao, Xinchen Wang, Ruiqi Wang, Tao Zhang, Qing Liao 0001 |
Game Rewards Vulnerabilities: Software Vulnerability Detection with Zero-Sum Game and Prototype Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.08131, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu |
ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.06838, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Ruofan Wu, Guanhua Fang, Qiying Pan, Mingyang Zhang, Tengfei Liu, Weiqiang Wang, Wenbiao Zhao |
On provable privacy vulnerabilities of graph representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.04033, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sivana Hamer, Marcelo d'Amorim, Laurie Williams |
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.15600, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Md Abdul Kadir, Gowtham Krishna Addluri, Daniel Sonntag |
Revealing Vulnerabilities of Neural Networks in Parameter Learning and Defense Against Explanation-Aware Backdoors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.16569, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Shuo Yang, Jiachi Chen, Mingyuan Huang, Zibin Zheng, Yuan Huang |
Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.19112, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran |
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.03704, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sara Abdali, Richard Anarfi, C. J. Barberan, Jia He |
Securing Large Language Models: Threats, Vulnerabilities and Responsible Practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.12503, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Antonino Sabetta, Serena Elisa Ponta, Rocío Cabrera Lozoya, Michele Bezzi, Tommaso Sacchetti, Matteo Greco, Gergö Balogh, Péter Hegedüs, Rudolf Ferenc, Ranindya Paramitha, Ivan Pashchenko, Aurora Papotti, Ákos Milánkovich, Fabio Massacci |
Known Vulnerabilities of Open Source Projects: Where Are the Fixes? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 22(2), pp. 49-59, March - April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Carlos M. Mejía-Granda, José Luis Fernández Alemán, Juan Manuel Carrillo de Gea, José A. García-Berná |
Security vulnerabilities in healthcare: an analysis of medical devices and software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Medical Biol. Eng. Comput. ![In: Medical Biol. Eng. Comput. 62(1), pp. 257-273, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sicong Cao, Xiaobing Sun 0001, Lili Bo, Rongxin Wu, Bin Li 0006, Xiaoxue Wu, Chuanqi Tao, Tao Zhang 0001, Wei Liu 0010 |
Learning to Detect Memory-related Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 33(2), pp. 43:1-43:35, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Zeqi Lai, Yangtao Deng, Hewu Li, Qian Wu, Qi Zhang |
Space Digital Twin for Secure Satellite Internet: Vulnerabilities, Methodologies, and Future Directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 38(1), pp. 30-37, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Heng Li, Xinqiang Li, Hongchang Wei |
Intelligent Detection and Analysis of Software Vulnerabilities based on Encryption Algorithms and Feature Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scalable Comput. Pract. Exp. ![In: Scalable Comput. Pract. Exp. 25(2), pp. 900-908, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Derui Zhu, Jinfu Chen 0002, Xuebing Zhou, Weiyi Shang, Ahmed E. Hassan, Jens Grossklags |
Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 3674-3689, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, Shouling Ji |
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 1251-1266, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sree Ranjani Rajendran, Nusrat Farzana Dipu, Shams Tarek, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor |
Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 3914-3926, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Nusrat Farzana Dipu, Avinash Ayalasomayajula, Mark M. Tehranipoor, Farimah Farahmandi |
AGILE: Automated Assertion Generation to Detect Information Leakage Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 1794-1809, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Jinke Song, Shangfeng Wan, Min Huang, Jiqiang Liu, Limin Sun, Qiang Li 0007 |
Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 20(1), pp. 6:1-6:26, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Nilufer Tuptuk, Stephen Hailes |
Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 137, pp. 103593, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Xixing Li, Lei Zhao, Qiang Wei, Zehui Wu, Weiming Shi, Yunchao Wang |
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 138, pp. 103618, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Pingyan Wang, Shaoying Liu, Ai Liu, Wen Jiang |
Detecting security vulnerabilities with vulnerability nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 208, pp. 111902, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Prabuddha Chakraborty, Jonathan Cruz 0001, Rasheed Almawzan, Tanzim Mahfuz, Swarup Bhunia |
Learning Your Lock: Exploiting Structural Vulnerabilities in Logic Locking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Des. Test ![In: IEEE Des. Test 41(2), pp. 7-14, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Taimur Bakhshi, Bogdan Ghita 0003, Ievgeniia Kuzminykh |
A Review of IoT Firmware Vulnerabilities and Auditing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(2), pp. 708, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | S. Arunprasath, A. Suresh |
A Reliable Framework for Detection of Smart Contract Vulnerabilities for Enhancing Operability in Inter-Organizational Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Mobile Multimedia ![In: J. Mobile Multimedia 20(2), pp. 411-434, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Tyler Cultice, Himanshu Thapliyal |
Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Consumer Electron. Mag. ![In: IEEE Consumer Electron. Mag. 13(1), pp. 54-61, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Stephen R. Milford, Bernice S. Elger, David M. Shaw |
Various Vulnerabilities in Highway Hierarchies: Applying the UK Highway Code's Hierarchy of Road Users to Autonomous Vehicle Decision-Making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Technoethics ![In: Int. J. Technoethics 15, pp. 1-12, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond |
An Empirical Study of Ransomware Vulnerabilities Descriptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 146-153, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Quancheng Wang, Ming Tang 0002, Ke Xu, Han Wang |
Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: IEEE International Symposium on High-Performance Computer Architecture, HPCA 2024, Edinburgh, United Kingdom, March 2-6, 2024, pp. 409-423, 2024, IEEE, 979-8-3503-9313-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Hari Hara Sudhan S, Sameer G. Kulkarni |
Security and Service Vulnerabilities with HTTP/3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSNETS ![In: 16th International Conference on COMmunication Systems & NETworkS, COMSNETS 2024, Bengaluru, India, January 3-7, 2024, pp. 55-60, 2024, IEEE, 979-8-3503-8311-9. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Long Vu, Kun Suo, Md Romyull Islam, Nobel Dhar, Tu N. Nguyen 0001, Selena He, Yong Shi 0002 |
Living on the Electric Vehicle and Cloud Era: A Study of Cyber Vulnerabilities, Potential Impacts, and Possible Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 2024 ACM Southeast Conference, ACM SE 2024, Marietta, GA, USA, April 18-20, 2024, pp. 18-26, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Raj Kumar B, Aruna Kranthi Godishala, Ravinder Reddy Malaga, Pradeep Kagitapu |
Securing web apps: Analysis to understand common vulnerabilities, attack scenarios, and protective measures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCDE ![In: Proceedings of the 2024 10th International Conference on Computing and Data Engineering, ICCDE 2024, Bangkok, Thailand, January 15-17, 2024, pp. 64-70, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, Francesco Buccafurri |
Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2024, Biarritz, France, March 11-15, 2024, pp. 114-124, 2024, IEEE, 979-8-3503-2603-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, Francesco Buccafurri |
REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom 2024 - Workshops, Biarritz, France, March 11-15, 2024, pp. 7-8, 2024, IEEE, 979-8-3503-0436-7. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Zihan Guan 0001, Mengxuan Hu, Zhongliang Zhou, Jielu Zhang, Sheng Li 0001, Ninghao Liu |
BadSAM: Exploring Security Vulnerabilities of SAM via Backdoor Attacks (Student Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 23506-23507, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Ignacio Astaburuaga, Shamik Sengupta |
Introduction to Quantum Systems and Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024, pp. 345-351, 2024, IEEE, 979-8-3503-0457-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Ingvar Tjøstheim |
Exploring Data-Disclosure Vulnerabilities and Phishing Assessed by the Cognitive Reflection Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 4754-4763, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
11 | Pengcheng Ren, Chaoshun Zuo, Xiaofeng Liu 0013, Wenrui Diao, Qingchuan Zhao, Shanqing Guo |
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, ICSE 2024, Lisbon, Portugal, April 14-20, 2024, pp. 41:1-41:13, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Austen Knapp, Emmanuel Wamuo, Minhajul Alam Rahat, Santiago Torres-Arias, Gedare Bloom, Yanyan Zhuang |
Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCWC ![In: 14th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2024, Las Vegas, NV, USA, January 8-10, 2024, pp. 467-473, 2024, IEEE, 979-8-3503-6013-4. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Haekyu Park |
Interactive Scalable Discovery Of Concepts, Evolutions, And Vulnerabilities In Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2024 |
RDF |
|
11 | Hengyan Zhang, Weizhe Zhang, Yuming Feng, Yang Liu 0039 |
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 75, pp. 103484, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Huan Mei, Guanjun Lin, Da Fang, Jun Zhang 0065 |
Detecting vulnerabilities in IoT software: New hybrid model and comprehensive data analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 74, pp. 103467, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hossein Pourrahmani, Adel Yavarinasab, Amir Mahdi Hosseini Monazzah, Jan Van herle |
A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 23, pp. 100888, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Suzan Almutairi, Ahmed Barnawi |
Federated learning vulnerabilities, threats and defenses: A systematic review and future directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 24, pp. 100947, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | R. Pavithra, Vishnu kumar Kaliappan, Sivaramakrishnan Rajendar |
Security Algorithm for Intelligent Transport System in Cyber-Physical Systems Perceptive: Attacks, Vulnerabilities, and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 4(5), pp. 544, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li 0001, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao 0001, Chunyi Peng 0001, Zhaowei Tan, Songwu Lu |
Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GetMobile Mob. Comput. Commun. ![In: GetMobile Mob. Comput. Commun. 27(1), pp. 39-43, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sara Baradaran, Mahdi Heidari, Ali Kamali, Maryam Mouzarani |
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 22(5), pp. 1277-1290, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Huimin Chen, Jiajia Liu 0001, Jiadai Wang, Yijie Xun |
Towards secure intra-vehicle communications in 5G advanced and beyond: Vulnerabilities, attacks and countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Veh. Commun. ![In: Veh. Commun. 39, pp. 100548, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xingmao Shao, Lun Xie, Chiqin Li, Zhiliang Wang |
A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 109(3), pp. 60, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yufeng Li 0002, Mengxiao Liu, Chenhong Cao, Jiangtao Li 0003 |
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(5), pp. 185, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ibrahim Bu Haimed, Marwan Ali Albahar, Ali Alzubaidi |
Exploiting Misconfiguration Vulnerabilities in Microsoft's Azure Active Directory for Privilege Escalation Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(7), pp. 226, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Manish Bhurtel, Danda B. Rawat |
Unveiling the Landscape of Operating System Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 15(7), pp. 248, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Anzhelika Mezina, Aleksandr Ometov |
Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 7(3), pp. 34, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Masaki Kobayashi, Yo Kanemoto, Daisuke Kotani, Yasuo Okabe |
Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Process. ![In: J. Inf. Process. 31, pp. 591-601, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Suryateja S. Pericherla |
Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC Int. J. Inf. Secur. ![In: ISC Int. J. Inf. Secur. 15(1), pp. 1-58, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Goran Piskachev, Matthias Becker, Eric Bodden |
Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 28(5), pp. 118, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jahanzaib Malik, Fabrizio Pastore |
An empirical study of vulnerabilities in edge frameworks to support security testing improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 28(4), pp. 99, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mahmoud Alfadel, Diego Elias Costa, Emad Shihab |
Empirical analysis of security vulnerabilities in Python packages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 28(3), pp. 59, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Owura Asare, Meiyappan Nagappan, N. Asokan |
Is GitHub's Copilot as bad as humans at introducing vulnerabilities in code? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 28(6), pp. 129, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jianfei Zhou, Ting Chen 0002 |
WASMOD: Detecting vulnerabilities in Wasm smart contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Blockchain ![In: IET Blockchain 3(4), pp. 172-181, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ying Xue |
Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cyber Secur. Mobil. ![In: J. Cyber Secur. Mobil. 12(5), pp. 697-710, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Keyvan Ramezanpour, Jithin Jagannath, Anu Jagannath |
Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 221, pp. 109515, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yu-Xuan Zhang, Hua Meng, Xuemei Cao, Zhengchun Zhou, Mei Yang, Avik Ranjan Adhikary |
Interpreting vulnerabilities of multi-instance learning to adversarial perturbations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. ![In: Pattern Recognit. 142, pp. 109725, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Eric Ke Wang, Zicong Chen, Xilin Dang, Xuan Fan, Xuming Han, Chien-Ming Chen 0001, Weiping Ding 0001, Siu-Ming Yiu, Jian Weng 0001 |
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Recognit. ![In: Pattern Recognit. 143, pp. 109745, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou, Euripidis Glavas |
Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. Priv. ![In: J. Cybersecur. Priv. 3(3), pp. 610-637, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hector Roussille, Önder Gürcan, Fabien Michel |
A Taxonomy of Blockchain Incentive Vulnerabilities for Networked Intelligent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 61(8), pp. 108-114, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Oscar Llorente-Vazquez, Igor Santos-Grueiro, Pablo García Bringas |
When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 44725-44740, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Fatih Kaslmoglu, Selami Bayeg, Durdu Hakan Utku |
Analyzing the Vulnerabilities in a Transshipment Network: A Bilevel Programming Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 57635-57651, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Faris Faisal Fadlalla, Huwaida T. I. Elshoush |
Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 40128-40161, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ruiyun Fu, Mary E. Lichtenwalner, Thomas J. Johnson |
A Review of Cybersecurity in Grid-Connected Power Electronics Converters: Vulnerabilities, Countermeasures, and Testbeds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 113543-113559, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Irena Bojanova, Carlos Eduardo Galhardo |
Bug, Fault, Error, or Weakness: Demystifying Software Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 25(1), pp. 7-12, January - February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Irena Bojanova, John J. Guerrerio |
Labeling Software Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Prof. ![In: IT Prof. 25(5), pp. 64-70, September - October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Daojing He, Rui Wu 0015, Xinji Li, Sammy Chan, Mohsen Guizani |
Detection of Vulnerabilities of Blockchain Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(14), pp. 12178-12185, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 4178 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|