The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Vulnerability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1986 (16) 1987-1992 (26) 1993-1996 (27) 1997-1998 (23) 1999-2000 (30) 2001 (24) 2002 (56) 2003 (86) 2004 (146) 2005 (196) 2006 (227) 2007 (250) 2008 (259) 2009 (209) 2010 (169) 2011 (137) 2012 (165) 2013 (198) 2014 (207) 2015 (226) 2016 (251) 2017 (257) 2018 (342) 2019 (424) 2020 (484) 2021 (581) 2022 (612) 2023 (775) 2024 (155)
Publication types (Num. hits)
article(2504) book(8) data(4) incollection(62) inproceedings(3886) phdthesis(73) proceedings(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1664 occurrences of 928 keywords

Results
Found 6558 publication records. Showing 6558 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Xin-Cheng Wen, Cuiyun Gao, Shuzheng Gao, Yang Xiao, Michael R. Lyu SCALE: Constructing Structured Natural Language Comment Trees for Software Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10David de-Fitero-Dominguez, Eva García-López, Antonio García-Cabot, José Javier Martínez-Herráiz Enhanced Automated Code Vulnerability Repair using Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Kohei Tsujio, Mohammad Abdullah Al Faruque, Yasser Shoukry Rampo: A CEGAR-based Integration of Binary Code Analysis and System Falsification for Cyber-Kinetic Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Imam Nur Bani Yusuf, Lingxiao Jiang Your Instructions Are Not Always Helpful: Assessing the Efficacy of Instruction Fine-tuning for Software Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Jian Zhang, Chong Wang, Anran Li, Weisong Sun, Cen Zhang, Wei Ma, Yang Liu 0003 An Empirical Study of Automated Vulnerability Localization with Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Naif Mehanna, Walter Rudametkin, Pierre Laperdrix, Antoine Vastel Free Proxies Unmasked: A Vulnerability and Longitudinal Analysis of Free Proxy Services. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Fernando Vera, Palina Pauliuchenka, Ethan Oh, Bai Chien Kao, Louis DiValentin, David A. Bader Profile of Vulnerability Remediations in Dependencies Using Graph Analysis. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Tao Peng, Ling Gui, Yi Sun VulMCI : Code Splicing-based Pixel-row Oversampling for More Continuous Vulnerability Image Generation. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Noble Saji Mathews, Yelizaveta Brus, Yousra Aafer, Meiyappan Nagappan, Shane McIntosh LLbezpeky: Leveraging Large Language Models for Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Gonzalo De La Torre Parra, Elias Bou-Harb, Peyman Najafirad LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Zexu Wang, Jiachi Chen, Zibin Zheng, Peilin Zheng, Yu Zhang, Weizhe Zhang Unity is Strength: Enhancing Precision in Reentrancy Vulnerability Detection of Smart Contract Analysis Tools. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Rasmus Ingemann Tuffveson Jensen, Vali Tawosi, Salwa Alamir Software Vulnerability and Functionality Assessment using LLMs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Nuo Chen, Jiqun Liu, Hanpei Fang, Yuankai Luo, Tetsuya Sakai, Xiao-Ming Wu 0003 Decoy Effect In Search Interaction: Understanding User Behavior and Measuring System Vulnerability. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Xin Zhou, Kisub Kim, Bowen Xu, DongGyun Han, David Lo 0001 Large Language Model as Synthesizer: Fusing Diverse Inputs for Better Automatic Vulnerability Repair. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Tan Khang Le, Saba Alimadadi, Steven Y. Ko A Study of Vulnerability Repair in JavaScript Programs with Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Rajdeep Haldar, Yue Xing 0002, Qifan Song Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Teimour Hosseinalizadeh, Nils Schlüter, Moritz Schulze Darup, Nima Monshizadeh Privacy Analysis of Affine Transformations in Cloud-based MPC: Vulnerability to Side-knowledge. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Ioanna Souvatzoglou, Athanasios Papadimitriou, Aitzan Sari, Vasileios Vlagkoulis, Mihalis Psarakis Analyzing the Single Event Upset Vulnerability of Binarized Neural Networks on SRAM FPGAs. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Jiahui Xiang, Wenhai Wang, Tong Ye, Peiyu Liu 0003 LuaTaint: A Static Taint Analysis System for Web Interface Framework Vulnerability of IoT Devices. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Olukorede Fakorede, Modeste Atsague, Jin Tian Improving Adversarial Training using Vulnerability-Aware Perturbation Budget. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Zhongxin Liu, Zhijie Tang, Junwei Zhang, Xin Xia 0001, Xiaohu Yang 0001 Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo 0001, Lei Ma 0003, Haoyu Wang Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Joshua Dimasaka, Christian Geiß, Emily So Global Mapping of Exposure and Physical Vulnerability Dynamics in Least Developed Countries using Remote Sensing and Machine Learning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Xin Zhou, Ting Zhang, David Lo 0001 Large Language Model for Vulnerability Detection: Emerging Results and Future Directions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Triet H. M. Le, Xiaoning Du 0001, Muhammad Ali Babar 0001 Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Guy Amit, Abigail Goldsteen, Ariel Farkash SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Zhenhong Zhou, Jiuyang Xiang, Haopeng Chen, Quan Liu, Zherui Li, Sen Su Speak Out of Turn: Safety Vulnerability of Large Language Models in Multi-turn Dialogue. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Alexey Shestov, Anton Cheshkov, Rodion Levichev, Ravil Mussabayev, Pavel Zadorozhny, Evgeny Maslov, Chibirev Vadim, Egor Bulychev Finetuning Large Language Models for Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yuqiang Sun 0001, Daoyuan Wu, Yue Xue, Han Liu, Wei Ma, Lyuye Zhang, Miaolei Shi, Yang Liu LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Murtuza Jadliwala, Peyman Najafirad Causative Insights into Open Source Software Security using Large Language Code Embeddings and Semantic Vulnerability Graph. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Yulei Sui, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang 0001 The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Paul Francis, David Wagner 0008 Towards more accurate and useful data anonymity vulnerability measures. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Xinyu Li, Yu Gu, Chenwei Wang, Peng Zhao A Model for Assessing Network Asset Vulnerability Using QPSO-LightGBM. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Bowen Peng, Bo Peng, Jingyuan Xia, Tianpeng Liu, Yongxiang Liu, Li Liu 0002 Towards Assessing the Synthetic-to-Measured Adversarial Vulnerability of SAR ATR. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Aleksey Novokhrestov, Anton Kalyakin, Aleksandr Kovalenko, Vladimir Repkin Creating a vulnerable node based on the vulnerability MS17-010. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Xin-Cheng Wen, Cuiyun Gao, Xinchen Wang, Ruiqi Wang, Tao Zhang, Qing Liao 0001 Game Rewards Vulnerabilities: Software Vulnerability Detection with Zero-Sum Game and Prototype Learning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yu Gao, Carlo Campajola, Nicoló Vallarano, Andreia Sofia Teixeira, Claudio J. Tessone Heterogeneity- and homophily-induced vulnerability of a P2P network formation model: the IOTA auto-peering protocol. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Nafis Tanveer Islam, Mohammad Bahrami Karkevandi, Peyman Najafirad Code Security Vulnerability Repair Using Reinforcement Learning with Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Zhenyu Mao, Jialong Li, Munan Li, Kenji Tei Multi-role Consensus through LLMs Discussions for Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Sahan Sanjaya, Aruna Jayasena, Prabhat Mishra 0001 Information Leakage through Physical Layer Supply Voltage Coupling Vulnerability. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Earl T. Barr, Wei Le A Comprehensive Study of the Capabilities of Large Language Models for Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David A. Wagner 0001, Baishakhi Ray, Yizheng Chen 0001 Vulnerability Detection with Code Language Models: How Far Are We? Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo 0001, Lili Bo, Bin Li, Wei Liu Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Adriana Sejfia, Satyaki Das, Saad Shafiq, Nenad Medvidovic Toward Improved Deep Learning-based Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Khai Jiet Liong, Hongqiu Wu, Hai Zhao Unveiling Vulnerability of Self-Attention. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Morten Roed Frederiksen, Katrin Fischer, Maja J. Mataric Robot Vulnerability and the Elicitation of User Empathy. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Shanker Ram, Chen Qian A Study on the Vulnerability of Test Questions against ChatGPT-based Cheating. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Fabio Massacci The Holy Grail of Vulnerability Predictions. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yuanhang Zhou, Fuchen Ma, Yuanliang Chen, Meng Ren, Yu Jiang 0001 CLFuzz: Vulnerability Detection of Cryptographic Algorithm Implementation via Semantic-aware Fuzzing. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Michael Fu, Van Nguyen 0002, Chakkrit Tantithamthavorn, Dinh Phung 0001, Trung Le Vision Transformer Inspired Automated Vulnerability Repair. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Jiamou Sun, Zhenchang Xing, Xin Xia 0001, Qinghua Lu 0001, Xiwei Xu 0001, Liming Zhu 0001 Aspect-level Information Discrepancies across Heterogeneous Vulnerability Reports: Severity, Types and Detection Methods. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Bharathi V, C. N. S. Vinoth Kumar Vulnerability Detection in Cyber-Physical System Using Machine Learning. Search on Bibsonomy Scalable Comput. Pract. Exp. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yan Liao Enhancing Industrial Control Network Security Through Vulnerability Detection and Attack Graph Analysis. Search on Bibsonomy Scalable Comput. Pract. Exp. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Qindong Li, Wenyi Tang, Xingshu Chen, Song Feng, Lizhi Wang Comprehensive vulnerability aspect extraction. Search on Bibsonomy Appl. Intell. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Xiaoli Zhang, Wenxiang Sun, Zhicheng Xu, Hongbing Cheng, Chengjun Cai, Helei Cui, Qi Li 0002 EVM-Shield: In-Contract State Access Control for Fast Vulnerability Detection and Prevention. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Kai Feng, Marco M. Cook, Angelos K. Marnerides Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic Controllers. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Tongshuai Wu, Liwei Chen, Gewangzi Du, Dan Meng, Gang Shi UltraVCS: Ultra-Fine-Grained Variable-Based Code Slicing for Automated Vulnerability Detection. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Hongzhang Chen, Jianxi Li, Wai Chee Shiu Spectral bounds for the vulnerability parameters of graphs. Search on Bibsonomy Comput. Appl. Math. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Xueyan Tang, Lingzhi Shi, Xun Wang, Kyle Charbonnet, Shixiang Tang, Shixiao Sun Zero-Knowledge Proof Vulnerability Analysis and Security Auditing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
10Peng Zhou 0002, Yuhan Gao Detecting prototype pollution for node.js: Vulnerability review and new fuzzing inputs. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Jag Mohan Singh, Raghavendra Ramachandra 3-D Face Morphing Attacks: Generation, Vulnerability and Detection. Search on Bibsonomy IEEE Trans. Biom. Behav. Identity Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Pingyan Wang, Shaoying Liu, Ai Liu, Wen Jiang Detecting security vulnerabilities with vulnerability nets. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Jie Cai, Bin Li 0006, Tao Zhang 0001, Jiale Zhang, Xiaobing Sun 0001 Fine-grained smart contract vulnerability detection by heterogeneous code feature learning and automated dataset construction. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Jaehyuk Lee, Wonbin Jeong, Kyungroul Lee Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Chunyong Zhang, Tianxiang Yu, Bin Liu, Yang Xin 0001 Vulnerability detection based on federated learning. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Manjin Shao, Hong Fan Identifying the systemic importance and systemic vulnerability of financial institutions based on portfolio similarity correlation network. Search on Bibsonomy EPJ Data Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Tongshuai Wu, Liwei Chen, Gewangzi Du, Chenguang Zhu, Ningning Cui, Gang Shi CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10M. W. R. Nuwanka, W. K. N. C. Withanage A GIS-based framework for flood hazard vulnerability evaluation in Thudawa area, Sri Lanka. Search on Bibsonomy Int. J. Inf. Decis. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Urvashi Bansal, Geeta Sikka, Lalit Kumar Awasthi, Bharat K. Bhargava Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Xiao Cheng 0002, Xu Nie, Ningke Li, Haoyu Wang 0001, Zheng Zheng 0001, Yulei Sui How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Jia Yang, Ou Ruan, JiXin Zhang Tensor-based gated graph neural network for automatic vulnerability detection in source code. Search on Bibsonomy Softw. Test. Verification Reliab. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yves Le Traon, Tao Xie 0001 Bud hunting with directed fuzz testing and source code vulnerability detection with advanced graph neural networks. Search on Bibsonomy Softw. Test. Verification Reliab. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Tumu Akshar, Vikram Singh 0005, N. L. Bhanu Murthy, Aneesh Krishna, Lov Kumar A Codebert Based Empirical Framework for Evaluating Classification-Enabled Vulnerability Prediction Models. Search on Bibsonomy ISEC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Kento Hasegawa, Katsutoshi Hanahara, Hiroshi Sugisaki, Minoru Kozu, Kazuhide Fukushima, Yosuke Murakami, Shinsaku Kiyomoto Vulnerability Information Sharing Platform for Securing Hardware Supply Chains. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Dmitry Levshun, Dmitry Vesnin Exploring BERT for Predicting Vulnerability Categories in Device Configurations. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yuki Ishida, Masaki Hanada, Atsushi Waseda, Moo Wan Kim Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses. Search on Bibsonomy ICACT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Jian-Chang Hsu Router Penetration Testing Based on CEM Vulnerability Assessment Criteria. Search on Bibsonomy ICACT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Ke Xu, Ming Tang 0002, Quancheng Wang, Han Wang Exploitation of Security Vulnerability on Retirement. Search on Bibsonomy HPCA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Xi Ling, Jiongchi Yu, Ziming Zhao 0008, Zhihao Zhou, Haitao Xu, Binbin Chen, Fan Zhang DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining. Search on Bibsonomy ACNS (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10TJ OConnor, Alex Schmith, Chris Stricklan, Marco Carvalho 0001, Sneha Sudhakaran PWN Lessons Made Easy with Docker: Toward an Undergraduate Vulnerability Research Cybersecurity Class. Search on Bibsonomy SIGCSE (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Hongwei Yu, Jiansheng Chen, Xinlong Ding, Yudong Zhang, Ting Tang, Huimin Ma 0001 Step Vulnerability Guided Mean Fluctuation Adversarial Attack against Conditional Diffusion Models. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yevheniy Sierhieiev, Vadym Paiuk, Anatoliy Sachenko, Andrii Nicheporuk, Andrzej Kwiecien A graph-based vulnerability detection method. Search on Bibsonomy IntelITSIS The full citation details ... 2024 DBLP  BibTeX  RDF
10Constance Hendrix, Gedare Bloom Platoon Vulnerability due to Network Topology and Targeted Vehicle. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Hozefa Lakadawala, Komla Dzigbede, Yu Chen Detecting Reentrancy Vulnerability in Smart Contracts using Graph Convolution Networks. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yifeng Peng, Xinyi Li, Jingda Yang, Sudhanshu Arya, Ying Wang RAFT: A Real-Time Framework for Root Cause Analysis in 5G and Beyond Vulnerability Detection. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Evelyn Kim, Sunny Fugate, Christian Lebiere, Aidan Barbieux, Jonathan Buch, Jaehoon Cho, Edward A. Cranford, Joseph DiVita, Jeremy Johnson, Mia Levy, Froylan Maldonado, Brianna Marsh, Donald Morrison, Jocelyn Rego, Mitchell Sayer, Alex Waagen, Rajan Bhattacharyya CAVA: Cognitive Aid for Vulnerability Analysis. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
10Benjamin Steenhoek, Hongyang Gao, Wei Le Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection. Search on Bibsonomy ICSE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Adriana Sejfia, Satyaki Das, Saad Shafiq, Nenad Medvidovic Toward Improved Deep Learning-based Vulnerability Detection. Search on Bibsonomy ICSE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Christoforos Seas, Glenn Fitzpatrick, John A. Hamilton Jr., Martin C. Carlisle Automated Vulnerability Detection in Source Code Using Deep Representation Learning. Search on Bibsonomy CCWC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Marija Ivanovska, Vitomir Struc On the Vulnerability of Deepfake Detectors to Attacks Generated by Denoising Diffusion Models. Search on Bibsonomy WACV (Workshops) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Jakkarin Lapmoon, Thunpisit Kosolsriwiwat, Sirinyaporn Jiraporn, Somchart Fugkeaw Enabling Dynamic Vulnerability Assessment for Multi-web Application Using Executable Directed Acyclic Graph. Search on Bibsonomy AINA (2) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Mounika Baddula, Biplob Ray, Mahmoud Elkhodr, Adnan Anwar, Pushpika Hettiarachchi Vulnerability Assessment and Risk Modeling of IoT Smart Home Devices. Search on Bibsonomy AINA (5) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Ryan Calo Social-Digital Vulnerability. Search on Bibsonomy HRI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Huipeng Liu, Baojiang Cui, Jie Xu, Lihua Niu An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing. Search on Bibsonomy EIDWT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Yiran Sun, Ziqi Wang, Kewei Liu, Baojiang Cui Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms. Search on Bibsonomy EIDWT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Feng Tian, Baojiang Cui, Chen Chen 0061 Binary Firmware Static Vulnerability Mining Based on Semantic Attributes and Graph Embedding Network. Search on Bibsonomy EIDWT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Siyuan Wang, Zhiwei Cui, Jie Xu 0038, Baojiang Cui An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial Testing. Search on Bibsonomy EIDWT The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
10Avrim Blum, Princewill Okoroafor, Aadirupa Saha, Kevin M. Stangl On the Vulnerability of Fairness Constrained Learning to Malicious Noise. Search on Bibsonomy AISTATS The full citation details ... 2024 DBLP  BibTeX  RDF
10Rajdeep Haldar, Yue Xing 0002, Qifan Song Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability. Search on Bibsonomy AISTATS The full citation details ... 2024 DBLP  BibTeX  RDF
10Lara Sucupira Furtado, Gustavo Moura, Daniel Jean Rodrigues Vasconcelos, Guilherme Sales Fernandes, Lívia Almada Cruz, Regis Pires Magalhães, Ticiana L. Coelho da Silva An analytical citizen relation management system (CZRM) for social vulnerability mapping and policy recommendation in Brazil. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 6558 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license