The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for vulnerabilities with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1990 (15) 1991-1998 (23) 1999-2000 (28) 2001 (32) 2002 (54) 2003 (93) 2004 (127) 2005 (198) 2006 (187) 2007 (249) 2008 (268) 2009 (190) 2010 (99) 2011 (93) 2012 (94) 2013 (90) 2014 (107) 2015 (135) 2016 (160) 2017 (167) 2018 (198) 2019 (254) 2020 (247) 2021 (268) 2022 (331) 2023 (377) 2024 (94)
Publication types (Num. hits)
article(1313) book(3) data(2) incollection(22) inproceedings(2772) phdthesis(66)
Venues (Conferences, Journals, ...)
CoRR(393) CCS(74) USENIX Security Symposium(66) ACSAC(53) ARES(44) Comput. Secur.(43) HICSS(41) IEEE Secur. Priv.(41) IEEE Access(37) DSN(34) AsiaCCS(32) NDSS(32) ICSE(27) ASE(26) SAC(26) RAID(23) More (+10 of total 1365)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1767 occurrences of 913 keywords

Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Peiqiang Li, Guojun Wang 0001, Xiaofei Xing, Xiangbin Li, Jinyao Zhu Detecting unknown vulnerabilities in smart contracts using opcode sequences. Search on Bibsonomy Connect. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Jie Su, Zhen Hong, Lei Ye, Tao Liu, Sizhuang Liang, Shouling Ji, Gagangeet Singh Aujla, Reheem Beyah, Zhenyu Wen Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Xiyang Wu, Ruiqi Xian, Tianrui Guan, Jing Liang 0006, Souradip Chakraborty, Fuxiao Liu, Brian M. Sadler, Dinesh Manocha, Amrit Singh Bedi On the Safety Concerns of Deploying LLMs/VLMs in Robotics: Highlighting the Risks and Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Marsalis T. Gibson, David Babazadeh, Claire J. Tomlin, Shankar Sastry 0001 Hacking Predictors Means Hacking Cars: Using Sensitivity Analysis to Identify Trajectory Prediction Vulnerabilities for Autonomous Driving Security. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin 0001 On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Jai Prakash Veerla, Poojitha Thota, Partha Sai Guttikonda, Shirin Nilizadeh, Jacob M. Luber Vulnerabilities Unveiled: Adversarially Attacking a Multimodal Vision Language Model for Pathology Imaging. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Chenyu Zhang, Lanjun Wang, Anan Liu Revealing Vulnerabilities in Stable Diffusion via Targeted Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Berkay Berabi, Alexey Gronskiy, Veselin Raychev, Gishor Sivanrupan, Victor Chibotaru, Martin T. Vechev DeepCode AI Fix: Fixing Security Vulnerabilities with Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Stefanos Chaliasos, Jens Ernstberger, David Theodore, David Wong, Mohammad Jahanara, Benjamin Livshits SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Chen Wu, Xi Li, Jiaqi Wang Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Chenxi Yang, Yujia Liu, Dingquan Li, Tingting Jiang 0001 Exploring Vulnerabilities of No-Reference Image Quality Assessment Models: A Query-Based Black-Box Method. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Steven Golob, Sikha Pentyala, Anuar Maratkhan, Martine De Cock High Epsilon Synthetic Data Vulnerabilities in MST and PrivBayes. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Somnath Banerjee, Sayan Layek, Rima Hazra, Animesh Mukherjee 0001 How (un)ethical are instruction-centric responses of LLMs? Unveiling the vulnerabilities of safety guardrails to harmful queries. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sven Cattell, Avijit Ghosh Coordinated Disclosure for AI: Beyond Security Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao 0001 A Repository-Level Dataset For Detecting, Classifying and Repairing Software Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Hongbin Liu, Michael K. Reiter, Neil Zhenqiang Gong Mudjacking: Patching Backdoor Vulnerabilities in Foundation Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yu Nong, Mohammed Aldeen, Long Cheng 0005, Hongxin Hu, Feng Chen, Haipeng Cai Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Zexu Wang, Jiachi Chen, Yanlin Wang, Yu Zhang, Weizhe Zhang, Zibin Zheng Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Francesco Salzano, Simone Scalabrino, Rocco Oliveto, Remo Pareschi Fixing Smart Contract Vulnerabilities: A Comparative Analysis of Literature and Developer's Practices. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Shuai Zhao, Meihuizi Jia, Luu Anh Tuan, Jinming Wen Universal Vulnerabilities in Large Language Models: In-context Learning Backdoor Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Mikhail Kazdagli, Mohit Tiwari, Akshat Kumar Leveraging AI Planning For Detecting Cloud Security Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Wejdene Haouari, Abdelhakim Senhaji Hafid, Marios Fokaefs Vulnerabilities of smart contracts and mitigation schemes: A Comprehensive Survey. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yifan Li 0009, Hangyu Guo, Kun Zhou 0002, Wayne Xin Zhao, Ji-Rong Wen Images are Achilles' Heel of Alignment: Exploiting Visual Vulnerabilities for Jailbreaking Multimodal Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Jinchang Hu, Lyuye Zhang, Chengwei Liu, Sen Yang, Song Huang, Yang Liu Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Triet H. M. Le, Xiaoning Du 0001, Muhammad Ali Babar 0001 Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Jun-Jie Zhang 0001, Deyu Meng Quantum-Inspired Analysis of Neural Network Vulnerabilities: The Role of Conjugate Variables in System Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, Francesco Buccafurri Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Xin-Cheng Wen, Cuiyun Gao, Xinchen Wang, Ruiqi Wang, Tao Zhang, Qing Liao 0001 Game Rewards Vulnerabilities: Software Vulnerability Detection with Zero-Sum Game and Prototype Learning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ruofan Wu, Guanhua Fang, Qiying Pan, Mingyang Zhang, Tengfei Liu, Weiqiang Wang, Wenbiao Zhao On provable privacy vulnerabilities of graph representations. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sivana Hamer, Marcelo d'Amorim, Laurie Williams Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Md Abdul Kadir, Gowtham Krishna Addluri, Daniel Sonntag Revealing Vulnerabilities of Neural Networks in Parameter Learning and Defense Against Explanation-Aware Backdoors. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Shuo Yang, Jiachi Chen, Mingyuan Huang, Zibin Zheng, Yuan Huang Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sara Abdali, Richard Anarfi, C. J. Barberan, Jia He Securing Large Language Models: Threats, Vulnerabilities and Responsible Practices. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Antonino Sabetta, Serena Elisa Ponta, Rocío Cabrera Lozoya, Michele Bezzi, Tommaso Sacchetti, Matteo Greco, Gergö Balogh, Péter Hegedüs, Rudolf Ferenc, Ranindya Paramitha, Ivan Pashchenko, Aurora Papotti, Ákos Milánkovich, Fabio Massacci Known Vulnerabilities of Open Source Projects: Where Are the Fixes? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Carlos M. Mejía-Granda, José Luis Fernández Alemán, Juan Manuel Carrillo de Gea, José A. García-Berná Security vulnerabilities in healthcare: an analysis of medical devices and software. Search on Bibsonomy Medical Biol. Eng. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sicong Cao, Xiaobing Sun 0001, Lili Bo, Rongxin Wu, Bin Li 0006, Xiaoxue Wu, Chuanqi Tao, Tao Zhang 0001, Wei Liu 0010 Learning to Detect Memory-related Vulnerabilities. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Zeqi Lai, Yangtao Deng, Hewu Li, Qian Wu, Qi Zhang Space Digital Twin for Secure Satellite Internet: Vulnerabilities, Methodologies, and Future Directions. Search on Bibsonomy IEEE Netw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Heng Li, Xinqiang Li, Hongchang Wei Intelligent Detection and Analysis of Software Vulnerabilities based on Encryption Algorithms and Feature Extraction. Search on Bibsonomy Scalable Comput. Pract. Exp. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Derui Zhu, Jinfu Chen 0002, Xuebing Zhou, Weiyi Shang, Ahmed E. Hassan, Jens Grossklags Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, Shouling Ji URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sree Ranjani Rajendran, Nusrat Farzana Dipu, Shams Tarek, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities Beneath Software. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Nusrat Farzana Dipu, Avinash Ayalasomayajula, Mark M. Tehranipoor, Farimah Farahmandi AGILE: Automated Assertion Generation to Detect Information Leakage Vulnerabilities. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Jinke Song, Shangfeng Wan, Min Huang, Jiqiang Liu, Limin Sun, Qiang Li 0007 Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Nilufer Tuptuk, Stephen Hailes Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Xixing Li, Lei Zhao, Qiang Wei, Zehui Wu, Weiming Shi, Yunchao Wang SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Pingyan Wang, Shaoying Liu, Ai Liu, Wen Jiang Detecting security vulnerabilities with vulnerability nets. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Prabuddha Chakraborty, Jonathan Cruz 0001, Rasheed Almawzan, Tanzim Mahfuz, Swarup Bhunia Learning Your Lock: Exploiting Structural Vulnerabilities in Logic Locking. Search on Bibsonomy IEEE Des. Test The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Taimur Bakhshi, Bogdan Ghita 0003, Ievgeniia Kuzminykh A Review of IoT Firmware Vulnerabilities and Auditing Techniques. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11S. Arunprasath, A. Suresh A Reliable Framework for Detection of Smart Contract Vulnerabilities for Enhancing Operability in Inter-Organizational Systems. Search on Bibsonomy J. Mobile Multimedia The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Tyler Cultice, Himanshu Thapliyal Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing. Search on Bibsonomy IEEE Consumer Electron. Mag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Stephen R. Milford, Bernice S. Elger, David M. Shaw Various Vulnerabilities in Highway Hierarchies: Applying the UK Highway Code's Hierarchy of Road Users to Autonomous Vehicle Decision-Making. Search on Bibsonomy Int. J. Technoethics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Claudia Lanza, Abdelkader Lahmadi, Fabian Osmond An Empirical Study of Ransomware Vulnerabilities Descriptions. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Quancheng Wang, Ming Tang 0002, Ke Xu, Han Wang Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities. Search on Bibsonomy HPCA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Hari Hara Sudhan S, Sameer G. Kulkarni Security and Service Vulnerabilities with HTTP/3. Search on Bibsonomy COMSNETS The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Long Vu, Kun Suo, Md Romyull Islam, Nobel Dhar, Tu N. Nguyen 0001, Selena He, Yong Shi 0002 Living on the Electric Vehicle and Cloud Era: A Study of Cyber Vulnerabilities, Potential Impacts, and Possible Strategies. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Raj Kumar B, Aruna Kranthi Godishala, Ravinder Reddy Malaga, Pradeep Kagitapu Securing web apps: Analysis to understand common vulnerabilities, attack scenarios, and protective measures. Search on Bibsonomy ICCDE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, Francesco Buccafurri Is Your Kettle Smarter Than a Hacker? A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. Search on Bibsonomy PerCom The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sara Lazzaro, Vincenzo De Angelis, Anna Maria Mandalari, Francesco Buccafurri REPLIOT: A Scalable Tool for Assessing Replay Attack Vulnerabilities on Consumer IoT Devices. Search on Bibsonomy PerCom Workshops The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Zihan Guan 0001, Mengxuan Hu, Zhongliang Zhou, Jielu Zhang, Sheng Li 0001, Ninghao Liu BadSAM: Exploring Security Vulnerabilities of SAM via Backdoor Attacks (Student Abstract). Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ignacio Astaburuaga, Shamik Sengupta Introduction to Quantum Systems and Security Vulnerabilities. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ingvar Tjøstheim Exploring Data-Disclosure Vulnerabilities and Phishing Assessed by the Cognitive Reflection Test. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
11Pengcheng Ren, Chaoshun Zuo, Xiaofeng Liu 0013, Wenrui Diao, Qingchuan Zhao, Shanqing Guo DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps. Search on Bibsonomy ICSE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Austen Knapp, Emmanuel Wamuo, Minhajul Alam Rahat, Santiago Torres-Arias, Gedare Bloom, Yanyan Zhuang Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware. Search on Bibsonomy CCWC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Haekyu Park Interactive Scalable Discovery Of Concepts, Evolutions, And Vulnerabilities In Deep Learning. Search on Bibsonomy 2024   RDF
11Hengyan Zhang, Weizhe Zhang, Yuming Feng, Yang Liu 0039 SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Huan Mei, Guanjun Lin, Da Fang, Jun Zhang 0065 Detecting vulnerabilities in IoT software: New hybrid model and comprehensive data analysis. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hossein Pourrahmani, Adel Yavarinasab, Amir Mahdi Hosseini Monazzah, Jan Van herle A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Suzan Almutairi, Ahmed Barnawi Federated learning vulnerabilities, threats and defenses: A systematic review and future directions. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11R. Pavithra, Vishnu kumar Kaliappan, Sivaramakrishnan Rajendar Security Algorithm for Intelligent Transport System in Cyber-Physical Systems Perceptive: Attacks, Vulnerabilities, and Countermeasures. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yiwen Hu, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li 0001, Sihan Wang, Jingwen Shi, Tian Xie, Li Xiao 0001, Chunyi Peng 0001, Zhaowei Tan, Songwu Lu Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures. Search on Bibsonomy GetMobile Mob. Comput. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sara Baradaran, Mahdi Heidari, Ali Kamali, Maryam Mouzarani A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Huimin Chen, Jiajia Liu 0001, Jiadai Wang, Yijie Xun Towards secure intra-vehicle communications in 5G advanced and beyond: Vulnerabilities, attacks and countermeasures. Search on Bibsonomy Veh. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xingmao Shao, Lun Xie, Chiqin Li, Zhiliang Wang A Study on Networked Industrial Robots in Smart Manufacturing: Vulnerabilities, Data Integrity Attacks and Countermeasures. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yufeng Li 0002, Mengxiao Liu, Chenhong Cao, Jiangtao Li 0003 Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ibrahim Bu Haimed, Marwan Ali Albahar, Ali Alzubaidi Exploiting Misconfiguration Vulnerabilities in Microsoft's Azure Active Directory for Privilege Escalation Attacks. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Manish Bhurtel, Danda B. Rawat Unveiling the Landscape of Operating System Vulnerabilities. Search on Bibsonomy Future Internet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Anzhelika Mezina, Aleksandr Ometov Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification. Search on Bibsonomy Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Masaki Kobayashi, Yo Kanemoto, Daisuke Kotani, Yasuo Okabe Generation of IDS Signatures through Exhaustive Execution Path Exploration in PoC Codes for Vulnerabilities. Search on Bibsonomy J. Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Suryateja S. Pericherla Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Goran Piskachev, Matthias Becker, Eric Bodden Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jahanzaib Malik, Fabrizio Pastore An empirical study of vulnerabilities in edge frameworks to support security testing improvement. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mahmoud Alfadel, Diego Elias Costa, Emad Shihab Empirical analysis of security vulnerabilities in Python packages. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Owura Asare, Meiyappan Nagappan, N. Asokan Is GitHub's Copilot as bad as humans at introducing vulnerabilities in code? Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jianfei Zhou, Ting Chen 0002 WASMOD: Detecting vulnerabilities in Wasm smart contracts. Search on Bibsonomy IET Blockchain The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ying Xue Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Keyvan Ramezanpour, Jithin Jagannath, Anu Jagannath Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yu-Xuan Zhang, Hua Meng, Xuemei Cao, Zhengchun Zhou, Mei Yang, Avik Ranjan Adhikary Interpreting vulnerabilities of multi-instance learning to adversarial perturbations. Search on Bibsonomy Pattern Recognit. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Eric Ke Wang, Zicong Chen, Xilin Dang, Xuan Fan, Xuming Han, Chien-Ming Chen 0001, Weiping Ding 0001, Siu-Ming Yiu, Jian Weng 0001 Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation. Search on Bibsonomy Pattern Recognit. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Anastasios Papathanasiou, George Liontos, Vasiliki Liagkou, Euripidis Glavas Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hector Roussille, Önder Gürcan, Fabien Michel A Taxonomy of Blockchain Incentive Vulnerabilities for Networked Intelligent Systems. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Oscar Llorente-Vazquez, Igor Santos-Grueiro, Pablo García Bringas When Memory Corruption Met Concurrency: Vulnerabilities in Concurrent Programs. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Fatih Kaslmoglu, Selami Bayeg, Durdu Hakan Utku Analyzing the Vulnerabilities in a Transshipment Network: A Bilevel Programming Approach. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Faris Faisal Fadlalla, Huwaida T. I. Elshoush Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ruiyun Fu, Mary E. Lichtenwalner, Thomas J. Johnson A Review of Cybersecurity in Grid-Connected Power Electronics Converters: Vulnerabilities, Countermeasures, and Testbeds. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Irena Bojanova, Carlos Eduardo Galhardo Bug, Fault, Error, or Weakness: Demystifying Software Security Vulnerabilities. Search on Bibsonomy IT Prof. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Irena Bojanova, John J. Guerrerio Labeling Software Security Vulnerabilities. Search on Bibsonomy IT Prof. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Daojing He, Rui Wu 0015, Xinji Li, Sammy Chan, Mohsen Guizani Detection of Vulnerabilities of Blockchain Smart Contracts. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 4178 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license