The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for vulnerabilities with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1990 (15) 1991-1998 (23) 1999-2000 (28) 2001 (32) 2002 (54) 2003 (93) 2004 (127) 2005 (198) 2006 (187) 2007 (249) 2008 (268) 2009 (190) 2010 (99) 2011 (93) 2012 (94) 2013 (90) 2014 (107) 2015 (135) 2016 (160) 2017 (167) 2018 (198) 2019 (254) 2020 (247) 2021 (268) 2022 (331) 2023 (377) 2024 (94)
Publication types (Num. hits)
article(1313) book(3) data(2) incollection(22) inproceedings(2772) phdthesis(66)
Venues (Conferences, Journals, ...)
CoRR(393) CCS(74) USENIX Security Symposium(66) ACSAC(53) ARES(44) Comput. Secur.(43) HICSS(41) IEEE Secur. Priv.(41) IEEE Access(37) DSN(34) AsiaCCS(32) NDSS(32) ICSE(27) ASE(26) SAC(26) RAID(23) More (+10 of total 1365)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1767 occurrences of 913 keywords

Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Julia Wunder, Andreas Kurtz 0004, Christian Eichenmüller, Freya Gassmann, Zinaida Benenson Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Majd Soud, Grischa Liebel, Mohammad Hamdaqa PrAIoritize: Learning to Prioritize Smart Contract Bugs and Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Madhu Selvaraj, Gias Uddin 0001 A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in the Wild. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Asmit Nayak, Rishabh Khandelwal, Kassem Fawaz Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Domenico Cotroneo, Cristina Improta, Pietro Liguori, Roberto Natella Vulnerabilities in AI Code Generators: Exploring Targeted Data Poisoning Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kobra Khanmohammadi, Raphaël Khoury Half-Day Vulnerabilities: A study of the First Days of CVE Entries. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiashu Xu, Mingyu Derek Ma, Fei Wang 0060, Chaowei Xiao, Muhao Chen Instructions as Backdoors: Backdoor Vulnerabilities of Instruction Tuning for Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Irdin Pekaric, Michael Felderer, Philipp Steinmüller VULNERLIZER: Cross-analysis Between Vulnerabilities and Software Libraries. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Saad Ullah, Mingji Han, Saurabh Pujar, Hammond Pearce, Ayse K. Coskun, Gianluca Stringhini Can Large Language Models Identify And Reason About Security Vulnerabilities? Not Yet. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen 0001, Lingling Fan 0003, Lida Zhao, Jiahui Wu, Yang Liu 0003 Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chinazunwa Uwaoma On Security Strategies for Addressing Potential Vulnerabilities in 6G Technologies Deployable in Healthcare. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tiehua Zhang, Rui Xu, Jianping Zhang, Yuzhe Tian, Xin Chen, Xiaowei Huang, Jun Yin, Xi Zheng 0001 DSHGT: Dual-Supervisors Heterogeneous Graph Transformer - A pioneer study of using heterogeneous graph learning for detecting software vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yang Li, Anna Maria Mandalari, Isabel Straw Who Let the Smart Toaster Hack the House? An Investigation into the Security Vulnerabilities of Consumer IoT Devices. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11wala Draidi Areed, Aiden Price, Kathryn Arnett, M. Helen Thompson, Reid Malseed, Kerrie L. Mengersen Assessing the Spatial Structure of the Association between Attendance at Preschool and Childrens Developmental Vulnerabilities in Queensland Australia. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Attia Qammar, Hongmei Wang, Jianguo Ding, Abdenacer Naouri, Mahmoud Daneshmand, Huansheng Ning Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Callum Mole, Ed Chalstrey, Peter Foster, Tim Hobson Digital identity architectures: comparing goals and vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tianyu Chen, Lin Li, Bingjie Shan, Guangtai Liang, Ding Li, Qianxiang Wang, Tao Xie 0001 Identifying Vulnerable Third-Party Libraries from Textual Descriptions of Vulnerabilities and Libraries. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yihao Chen, Jiahuei Lin, Bram Adams, Ahmed E. Hassan Why Not Mitigate Vulnerabilities in Helm Charts? Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11John Harshith, Mantej Singh Gill, Madhan Jothimani Evaluating the Vulnerabilities in ML systems in terms of adversarial attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Christopher West, Ivy Vecna, Raiyan Chowdhury Random (Un)rounding : Vulnerabilities in Discrete Attribute Disclosure in the 2021 Canadian Census. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Erfan Darzi, Florian Dubost, Nanna Maria Sijtsema, Peter M. A. van Ooijen The Hidden Adversarial Vulnerabilities of Medical Federated Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Avishree Khare, Saikat Dutta, Ziyang Li, Alaia Solko-Breslin, Rajeev Alur, Mayur Naik Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha A. Larson, Stjepan Picek Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Michael Fu, Trung Le, Van Nguyen 0002, Chakkrit Tantithamthavorn, Dinh Q. Phung Learning to Quantize Vulnerability Patterns and Match to Locate Statement-Level Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar 0001 A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Richard G. Mathieu, Alan E. Turovlin Lost in the middle - a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART). Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mahmoud Alfadel, Diego Elias Costa, Emad Shihab, Bram Adams On the Discoverability of npm Vulnerabilities in Node.js Projects. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hongyi Pu, Liang He 0002, Peng Cheng 0001, Mingyang Sun, Jiming Chen 0001 Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations. Search on Bibsonomy IEEE Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Gianpiero Costantino, Ilaria Matteucci Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nikolay Karapetyants, Dmitry Efanov A practical approach to learning Linux vulnerabilities. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Buxiang Zhou, Binjie Sun, Tianlei Zang, Yating Cai, Jiale Wu, Huan Luo Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones Practically-exploitable Cryptographic Vulnerabilities in Matrix. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
11Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
11Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
11Felix Schuckert, Basel Katt, Hanno Langweg Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jonathan M. Spring An analysis of how many undiscovered vulnerabilities remain in information systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Katarzyna Filus, Joanna Domanska Software vulnerabilities in TensorFlow-based deep learning applications. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Abhishek Sharma, Sangeeta Sabharwal, Sushama Nagpal A hybrid scoring system for prioritization of software vulnerabilities. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zaina Abuabed, Ahmad S. Alsadeh, Adel Taweel STRIDE threat model-based framework for assessing the vulnerabilities of modern vehicles. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Konstantinos Charmanas, Nikolaos Mittas, Lefteris Angelis Topic and influence analysis on technological patents related to security vulnerabilities. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ruipeng Wang, Kaixiang Chen, Zulie Pan, Yuwei Li, Qianyu Li, Yang Li, Min Zhang, Chao Zhang 0008 Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Manar Alanazi, Abdun Mahmood, Mohammad Jabed Morshed Chowdhury SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Stefano Silvestri, Shareeful Islam, Spyridon Papastergiou, Christos Tzagkarakis, Mario Ciampi A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hugo Riggs, Shahid Tufail, Imtiaz Parvez, Mohd Tariq, Mohammed Aquib Khan, Asham Amir, Kedari Vineetha Vuda, Arif I. Sarwat Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Damilola Oladimeji, Amar Rasheed, Cihan Varol, Mohamed Baza, Hani Alshahrani, Abdullah Baz CANAttack: Assessing Vulnerabilities within Controller Area Network. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ismael Delgado, Elio San Cristóbal, Sergio Martín 0001, Antonio Robles-Gómez Exploring IoT Vulnerabilities in a Comprehensive Remote Cybersecurity Laboratory. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Muhammad Muzamil Aslam, Ali Tufail, Ki-Hyung Kim, Rosyzie Anna Awg Haji Mohd Apong, Muhammad Taqi Raza A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zihua Song, Junfeng Wang 0003, Kaiyuan Yang 0004, Jigang Wang HGIVul: Detecting inter-procedural vulnerabilities based on hypergraph convolution. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hanting Chu, Pengcheng Zhang, Hai Dong, Yan Xiao 0002, Shunhui Ji, Wenrui Li A survey on smart contract vulnerabilities: Data sources, detection and repair. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Francesco Parolini, Antoine Miné Sound static analysis of regular expressions for vulnerabilities to denial of service attacks. Search on Bibsonomy Sci. Comput. Program. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Peng Liu 0044, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao, Yongnan Li Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities. Search on Bibsonomy Cybersecur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Qiang Xiong, Yifei Zhu, Zhangying Zeng, Xinqi Yang Signal Game Analysis between Software Vendors and Third-Party Platforms in Collaborative Disclosure of Network Security Vulnerabilities. Search on Bibsonomy Complex. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Luiza Odete Herback de Carvalho Macedo, Miguel Elias M. Campista Attacks to mobile networks using SS7 vulnerabilities: a real traffic analysis. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Majid Salehi, Luca Degani, Marco Roveri, Danny Hughes 0001, Bruno Crispo Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ling Jin, Yinzhi Cao, Yan Chen 0004, Di Zhang, Simone Campanoni ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah 0002, Xinming Ou Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xiguo Gu, Liwei Zheng, Huiwen Yang, Shifan Liu, Zhanqi Cui OC-Detector: Detecting Smart Contract Vulnerabilities Based on Clustering Opcode Instructions. Search on Bibsonomy Int. J. Softw. Eng. Knowl. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Akshat Jain, Prasanna Shete Accounting for the Unaccounted Vulnerabilities Found in Endpoint ISP SOHO Router. Search on Bibsonomy ICCST The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shams Tabrez Siddiqui, Mohammad Shahid Kamal, Khalid Ali Qidwai, Md Imran Alam, Haneef Khan, Malik Zaib Alam, Ishan Budhiraja, Sandeep Chintham Uncovering Network Vulnerabilities and Conducting Digital Forensics Analysis for IoT Device Security in 6G. Search on Bibsonomy ANTS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Marwan Omar, Stavros Shiaeles VulDetect: A novel technique for detecting software vulnerabilities using Language Models. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zaynab Lamoyero, Oluwatobi Fajana Exposed: Critical Vulnerabilities in USSD Banking Authentication Protocols. Search on Bibsonomy CSR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11C. G. Frédéric Bogaerts, Naghmeh Ivaki, José Fonseca 0002 Using AI to Inject Vulnerabilities in Python Code. Search on Bibsonomy DSN-W The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiadong Lou, Xiaohan Zhang, Yihe Zhang, Xinghua Li, Xu Yuan 0001, Ning Zhang 0017 Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems. Search on Bibsonomy DSN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xingchen Chen, Baizhu Wang, Ze Jin, Yun Feng, Xianglong Li, Xincheng Feng, Qixu Liu Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities. Search on Bibsonomy DSN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuanpeng Wang, Ziqi Zhang, Ningyu He, Zhineng Zhong, Shengjian Guo, Qinkun Bao, Ding Li 0001, Yao Guo 0001, Xiangqun Chen SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chuanqi Xu, Ferhat Erata, Jakub Szefer Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tejas Kannan, Nick Feamster, Henry Hoffmann Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rauli Kaksonen, Kimmo Halunen, Juha Röning Vulnerabilities in IoT Devices, Backends, Applications, and Components. Search on Bibsonomy ICISSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Santoshi Rudrakar, Parag Rughani, Jeet Rami UART Port Bane or Boon: Vulnerabilities vs Significance for Digital Investigation in Ag-IoT. Search on Bibsonomy SIN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jackson Lim, Yi Lin Lau, Leshawn Khin Ming Chan, Jia Ming Tristan Paul Goo, Huahua Zhang, Zhiyuan Zhang 0004, Huaqun Guo CVE Records of Known Exploited Vulnerabilities. Search on Bibsonomy ICCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Natarajan Krishnaraj, Chirag Madaan, Sanjana Awasthi, Raggav Subramani, Harsh Avinash, Sankalp Mukim Common vulnerabilities in real world web applications. Search on Bibsonomy doors The full citation details ... 2023 DBLP  BibTeX  RDF
11Shams Tarek, Hasan Al Shaikh, Sree Ranjani Rajendran, Farimah Farahmandi Benchmarking of SoC-Level Hardware Vulnerabilities: A Complete Walkthrough. Search on Bibsonomy ISVLSI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Regner Sabillon, Juan Ramón Bermejo Higuera The Importance of Cybersecurity Awareness Training in the Aviation Industry for Early Detection of Cyberthreats and Vulnerabilities. Search on Bibsonomy HCI (53) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Utku Tefek, Ertem Esiner, Carmen Cheh, Daisuke Mashima A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies. Search on Bibsonomy CNS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11M. Mehdi Kholoosi, Muhammad Ali Babar 0001, Cemal Yilmaz Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels. Search on Bibsonomy CNS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Suliman Alazmi, Daniel Conte de Leon Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Toru Sakon, Yukikazu Nakamoto Structured Specification Framework for the Attacks, Weaknesses, and Vulnerabilities of Vehicle E&E systems. Search on Bibsonomy VTC2023-Spring The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Bui Van Cong, Cho Do Xuan Detecting Software Vulnerabilities Based on Source Code Analysis using GCN Transformer. Search on Bibsonomy RIVF The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sree Ranjani Rajendran, Shams Tarek, Benjamin M. Hicks, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor HUnTer: Hardware Underneath Trigger for Exploiting SoC-level Vulnerabilities. Search on Bibsonomy DATE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Annika Nykänen, Andrei Costin A View on Vulnerabilities Within IoT Devices in the Smart Home Environment. Search on Bibsonomy BMSD The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shiwen Shen, Guo Z. Zhen, Liu T. Tianling, Bian C. Chenya, Ning Y. Yuqiao, Chen Y. Yang Research and Analysis of Vulnerabilities in Intelligent Connected Vehicle Components. Search on Bibsonomy DSIT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Victor Bandur, Mark Lawford, Sébastien Mosser 0001, Richard F. Paige, Vera Pantelic, Alan Wassyng Using Assurance Cases to Prevent Malicious Behaviour from Targeting Safety Vulnerabilities. Search on Bibsonomy SAFECOMP Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rita Melo, Pedro Pinto 0001, António Pinto Severity Analysis of Web3 Security Vulnerabilities Based on Publicly Bug Reports. Search on Bibsonomy BLOCKCHAIN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mohamed Yanis Sadaoui, Osman Salem, Ahmed Mehaoua Security Assessment of Bluetooth Just Works Pairing Method: Vulnerabilities and Enhancements. Search on Bibsonomy HealthCom The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rydhampreet Singh Gindra, Kashish Goyal, Janvi Sethi, Chetna Kaushal Phishing and Web Hacking: Examining the Vulnerabilities and Defenses in the Digital Age. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Crystal Contreras, Hristina Dokic, Zhen Huang 0002, Daniela Stan Raicu, Jacob Furst 0001, Roselyne Tchoua Multiclass Classification of Software Vulnerabilities with Deep Learning. Search on Bibsonomy ICMLC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Arnaud Varillon, Laurent Sauvage, Jean-Luc Danger High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA. Search on Bibsonomy SPACE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Matida Churu, Dewald Blaauw, Bruce W. Watson A Review and Analysis of Cybersecurity Threats and Vulnerabilities, by Development of a Fuzzy Rule-Based Expert System. Search on Bibsonomy PanAfriCon AI (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Isabelle Heyl, Dewald Blaauw, Bruce W. Watson An Investigation and Analysis of Vulnerabilities Surrounding Cryptocurrencies and Blockchain Technology. Search on Bibsonomy PanAfriCon AI (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Abdellatif Bakar, Abdelhamid Zouhair, El Mokhtar En-Naimi Review of Vulnerabilities and Countermeasures Against Sybil Attacks on Decentralized Systems Based on Machine Learning Algorithms. Search on Bibsonomy NISS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rashmi Sahay, Cherukuri Gaurav Sushant Investigating Vulnerabilities of Information Solicitation Process in RPL-Based IoT Networks. Search on Bibsonomy FICTA (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Artur Balsam, Michal Walkowski, Maciej Roman Nowak, Jacek Oko, Slawomir Sujecki Automated Calculation of CVSS v3.1 Temporal Score Based on Apache Log4j 2021 Vulnerabilities. Search on Bibsonomy SoftCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Federico Carboni, Mauro Conti, Denis Donadel, Mariano Sciacco If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps. Search on Bibsonomy ACNS Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Salim Al Wahaibi, Myles Foley, Sergio Maffeis SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Qinhong Jiang, Xiaoyu Ji 0001, Chen Yan 0001, Zhixin Xie, Haina Lou, Wenyuan Xu 0001 GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Yuanyuan Yuan, Zhibo Liu, Shuai Wang 0011 CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Nicholas Boucher, Ross Anderson 0001 Trojan Source: Invisible Vulnerabilities. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang 0014, Xiaohui Kuang, Gang Zhao Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
Displaying result #701 - #800 of 4178 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license