The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for vulnerabilities with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1990 (15) 1991-1998 (23) 1999-2000 (28) 2001 (32) 2002 (54) 2003 (93) 2004 (127) 2005 (198) 2006 (187) 2007 (249) 2008 (268) 2009 (190) 2010 (99) 2011 (93) 2012 (94) 2013 (90) 2014 (107) 2015 (135) 2016 (160) 2017 (167) 2018 (198) 2019 (254) 2020 (247) 2021 (268) 2022 (331) 2023 (377) 2024 (94)
Publication types (Num. hits)
article(1313) book(3) data(2) incollection(22) inproceedings(2772) phdthesis(66)
Venues (Conferences, Journals, ...)
CoRR(393) CCS(74) USENIX Security Symposium(66) ACSAC(53) ARES(44) Comput. Secur.(43) HICSS(41) IEEE Secur. Priv.(41) IEEE Access(37) DSN(34) AsiaCCS(32) NDSS(32) ICSE(27) ASE(26) SAC(26) RAID(23) More (+10 of total 1365)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1767 occurrences of 913 keywords

Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Yuba Raj Siwakoti, Manish Bhurtel, Danda B. Rawat, Adam Oest, RC Johnson Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yomna Abdelrahman, Florian Alt, Tilman Dingler, Christopher Hadnagy, Abbie Maroño, Verena Distler Defining and Fortifying Against Cognitive Vulnerabilities in Social Engineering (Dagstuhl Seminar 23462). Search on Bibsonomy Dagstuhl Reports The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lukman Adewale Ajao, Simon Tooswem Apeh Secure edge computing vulnerabilities in smart cities sustainability using petri net and genetic algorithm-based reinforcement learning. Search on Bibsonomy Intell. Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Vincent Werner, Laurent Maingault, Marie-Laure Potet An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ivan Palamà, Alessandro Amici, Gabriele Bellicini, Francesco Gringoli, Fabio Pedretti, Giuseppe Bianchi 0001 Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments. Search on Bibsonomy Comput. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Barbara Guidi, Andrea Michienzi Delving NFT vulnerabilities, a sleepminting prevention system. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuqin Dou, Chongyan Gu, Chenghua Wang, Weiqiang Liu 0001, Fabrizio Lombardi Security and Approximation: Vulnerabilities in Approximation-Aware Testing. Search on Bibsonomy IEEE Trans. Emerg. Top. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yu Chen, Zulie Pan, Yuanchao Chen, Yuwei Li DISOV: Discovering Second-Order Vulnerabilities Based on Web Application Property Graph. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Aurelien T. Mozipo, John M. Acken Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists. Search on Bibsonomy IET Comput. Digit. Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer IoT Vulnerabilities and Attacks: SILEX Malware Case Study. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Quecheng Qiu, Xuyang Zhang, Shunyi Yao, Yu'an Chen, Guangda Chen, Bei Hua, Jianmin Ji Training a Non-Cooperator to Identify Vulnerabilities and Improve Robustness for Robot Navigation. Search on Bibsonomy IEEE Robotics Autom. Lett. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Omar Flor-Unda, Freddy Simbaña, Xavier Larriva-Novo, Ángel Acuña, Rolando Tipán, Patricia Acosta-Vargas A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America. Search on Bibsonomy Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li 0001, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie, Guan-Hua Tu Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero Multi-stage Proof-of-Works: Properties and vulnerabilities. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique 0001 SeVuc: A study on the Security Vulnerabilities of Capsule Networks against adversarial attacks. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Konstantinos Charmanas, Nikolaos Mittas, Lefteris Angelis Exploitation of Vulnerabilities: A Topic-Based Machine Learning Framework for Explaining and Predicting Exploitation. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Cainã Figueiredo, João Gabriel Lopes de Oliveira, Rodrigo Azevedo Santos, Daniel Vieira, Lucas Miranda, Gerson Zaverucha, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits. Search on Bibsonomy IEEE Trans. Netw. Serv. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wangyang Yu, Lu Liu 0001, Xiaoming Wang 0001, Ovidiu Bagdasar, John Panneerselvam Modeling and Analyzing Logic Vulnerabilities of E-Commerce Systems at the Design Phase. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xingxin Pan, Zeynep H. Coban Akdemir, Ruixuan Gao, Xiaoqian Jiang, Gloria M. Sheynkman, Erxi Wu, Jason H. Huang, Nidhi Sahni, S. Stephen Yi AD-Syn-Net: systematic identification of Alzheimer's disease-associated mutation and co-mutation vulnerabilities via deep learning. Search on Bibsonomy Briefings Bioinform. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ioannis Zografopoulos, Nikos D. Hatziargyriou, Charalambos Konstantinou Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sara Palacios Chavarro, Pantaleone Nespoli, Daniel Díaz López, Yury Niño Roa On the Way to Automatic Exploitation of Vulnerabilities and Validation of Systems Security through Security Chaos Engineering. Search on Bibsonomy Big Data Cogn. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Prarna Mehta, Shubhangi Aggarwal, Abhishek Tandon The Effect of Topic Modelling on Prediction of Criticality Levels of Software Vulnerabilities. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Daniel A. Sepulveda Estay A system dynamics, epidemiological approach for high-level cyber-resilience to zero-day vulnerabilities. Search on Bibsonomy J. Simulation The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Alexandru Oarga, Bridget Bannerman, Jorge Júlvez CONTRABASS: exploiting flux constraints in genome-scale models for the detection of vulnerabilities. Search on Bibsonomy Bioinform. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11G. S. Kubrin, Peter D. Zegzhda Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code. Search on Bibsonomy Autom. Control. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Emanuele Iannone, Roberta Guadagni, Filomena Ferrucci, Andrea De Lucia, Fabio Palomba The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xi Xu, Qinghua Zheng, Zheng Yan 0002, Ming Fan 0002, Ang Jia, Zhaohui Zhou, Haijun Wang, Ting Liu 0002 PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zimin Chen, Steve Kommrusch, Martin Monperrus Neural Transfer Learning for Repairing Security Vulnerabilities in C Code. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mahnoor Shahid Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Moritz Mock Utilization of machine learning for the detection of self-admitted vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Li Zhong A Survey of Prevent and Detect Access Control Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zhuzhu Wang, Ying Wang NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time Profiling. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jingfeng Zhang, Bo Song, Bo Han 0003, Lei Liu, Gang Niu 0001, Masashi Sugiyama Assessing Vulnerabilities of Adversarial Learning Algorithm through Poisoning Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hossein Hajipour, Thorsten Holz, Lea Schönherr, Mario Fritz Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sicong Cao, Biao He, Xiaobing Sun 0001, Yu Ouyang, Chao Zhang 0008, Xiaoxue Wu, Ting Su 0001, Lili Bo, Bin Li 0006, Chuanlei Ma, Jiajia Li, Tao Wei ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Abodh Poudyal, Shishir Lamichhane, Charlotte Wertz, Sajjad Uddin Mahmud, Anamika Dubey Hurricane and Storm Surges-Induced Power System Vulnerabilities and their Socioeconomic Impact. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis 0001 Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Maximilian Mozes, Xuanli He, Bennett Kleinberg, Lewis D. Griffin Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sarthak Roy, Ashish Harshavardhan, Animesh Mukherjee 0001, Punyajoy Saha Probing LLMs for hate speech detection: strengths and vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tyler Cultice, Himanshu Thapliyal Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Paschal C. Amusuo, Kyle A. Robinson, Santiago Torres-Arias, Laurent Simon, James C. Davis 0001 Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen Demystifying RCE Vulnerabilities in LLM-Integrated Apps. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun 0001, Shuang Hao, Haojin Zhu, Minhui Xue A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11George Kour, Marcel Zalmanovici, Naama Zwerdling, Esther Goldbraich, Ora Nova Fandina, Ateret Anaby-Tavor, Orna Raz, Eitan Farchi Unveiling Safety Vulnerabilities of Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zihan Guan 0001, Mengxuan Hu, Zhongliang Zhou, Jielu Zhang, Sheng Li 0001, Ninghao Liu BadSAM: Exploring Security Vulnerabilities of SAM via Backdoor Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Aysha Thahsin Zahir Ismail, Raj Mani Shukla Analyzing the vulnerabilities in SplitFed Learning: Assessing the robustness against Data Poisoning Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kelsey Nelson, Javad Mohammadi, Yu Chen 0002, Erik Blasch, Alex Aved, David Ferris, Erika Ardiles-Cruz, Philip Morrone Electric Vehicle Aggregation Review: Benefits and Vulnerabilities of Managing a Growing EV Fleet. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner The CURE To Vulnerabilities in RPKI Validation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Marwan Omar Detecting software vulnerabilities using Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lingbo Mo, Boshi Wang, Muhao Chen, Huan Sun 0001 How Trustworthy are Open-Source LLMs? An Assessment under Malicious Demonstrations Shows their Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuqiang Sun 0001, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu 0003 When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sander Schulhoff, Jeremy Pinto, Anaum Khan, Louis-François Bouchard, Chenglei Si, Svetlina Anati, Valen Tagliabue, Anson Liu Kost, Christopher Carnahan, Jordan L. Boyd-Graber Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yimika Erinle, Yathin Kethepalli, Yebo Feng, Jiahua Xu SoK: Design, Vulnerabilities and Defense of Cryptocurrency Wallets. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiawen Shi, Yixin Liu, Pan Zhou, Lichao Sun 0001 BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ravil Mussabayev Dissecting Code Vulnerabilities: Insights from C++ and Java Vulnerability Analysis with ReVeal Model. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Stefan-Claudiu Susan, Andrei Arusoaie Identifying Vulnerabilities in Smart Contracts using Interval Analysis. Search on Bibsonomy FROM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11M. Xie, T. Rahat, W. Wang, Y. Tian Using Program Knowledge Graph to Uncover Software Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu 0013, Alfredo Cuzzocrea Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nate Haris, Kendree Chen, Ann Song, Benjamin Pou Finding Vulnerabilities in Mobile Application APIs: A Modular Programmatic Approach. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mst. Shapna Akter, Hossain Shahriar, Iysa Iqbal, Md Faruque Hossain, M. A. Karim, Victor Clincy, Razvan Voicu Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Anders Mølmen Høst, Pierre Lison, Leon Moonen Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11M. Mehdi Kholoosi, Muhammad Ali Babar 0001, Cemal Yilmaz Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11MD Asibul Hasan, Md. Mijanur Rahman Minimize Web Applications vulnerabilities through the early Detection of CRLF Injection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yueqing Liang, Lu Cheng 0001, Ali Payani, Kai Shu Beyond Detection: Unveiling Fairness Vulnerabilities in Abusive Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chihiro Kado, Naoto Yanai, Jason Paul Cruz, Kyosuke Yamashita, Shingo Okamura An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Janislley Oliveira de Sousa, Bruno Carvalho de Farias, Thales Araujo da Silva, Eddie Batista de Lima Filho, Lucas C. Cordeiro Finding Software Vulnerabilities in Open-Source C Projects via Bounded Model Checking. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Pengcheng Fang, Peng Gao 0008, Yun Peng, Qingzhao Zhang, Tao Xie 0001, Dawn Song, Prateek Mittal, Sanjeev R. Kulkarni, Zhuotao Liu, Xusheng Xiao CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Davide Corradini, Michele Pasqua, Mariano Ceccato Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Dongyu Yao, Jianshu Zhang, Ian G. Harris, Marcel Carlsson FuzzLLM: A Novel and Universal Fuzzing Framework for Proactively Discovering Jailbreak Vulnerabilities in Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hadi Eskandari, Michael Bewong, Sabih ur Rehman OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael B. Abu-Ghazaleh Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sagar Babu Mitikiri, K. Victor Sam Moses Babu, Divyanshi Dwivedi, Vedantham Lakshmi Srinivas, Pratyush Chakraborty, Pradeep Kumar Yemula, Mayukha Pal Modelling of the Electric Vehicle Charging Infrastructure as Cyber Physical Power Systems: A Review on Components, Standards, Vulnerabilities and Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ao-Xiang Zhang, Yu Ran, Weixuan Tang, Yuan-Gen Wang Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xuandong Zhao, Kexun Zhang, Yu-Xiang Wang 0003, Lei Li 0005 Generative Autoencoders as Watermark Attackers: Analyses of Vulnerabilities and Threats. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chaozheng Wang, Zongjie Li, Yun Peng, Shuzheng Gao, Sirong Chen, Shuai Wang 0011, Cuiyun Gao, Michael R. Lyu REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Boyang Zhang, Zheng Li 0023, Ziqing Yang 0002, Xinlei He, Michael Backes 0001, Mario Fritz, Yang Zhang 0016 SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yi Wu, Nan Jiang 0012, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan 0001, Petr Babkin, Sameena Shah How Effective Are Neural Networks for Fixing Security Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Michael Fu, Chakkrit Tantithamthavorn, Trung Le, Yuki Kume, Van Nguyen 0002, Dinh Phung 0001, John C. Grundy AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li 0001 ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yusuke Kawamoto 0001, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro OpenSCV: An Open Hierarchical Taxonomy for Smart Contract Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yuyang Han, Xu Ji, Zhiqiang Wang 0006, Jianyi Zhang Systematic Analysis of Security and Vulnerabilities in Miniapps. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11André Storhaug, Jingyue Li, Tianyuan Hu Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lyuye Zhang, Chengwei Liu, Sen Chen 0001, Zhengzi Xu, Lingling Fan 0003, Lida Zhao, Yiran Zhang, Yang Liu 0003 Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiahao Li Metamorphic Testing for Smart Contract Vulnerabilities Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin 0001 MISA: Unveiling the Vulnerabilities in Split Federated Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Inga Strümke, Marija Slavkovik 0001, Clemens Stachl Against Algorithmic Exploitation of Human Vulnerabilities. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jonathan M. Spring An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 4178 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license