|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1767 occurrences of 913 keywords
|
|
|
Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Yuba Raj Siwakoti, Manish Bhurtel, Danda B. Rawat, Adam Oest, RC Johnson |
Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(13), pp. 11224-11239, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yomna Abdelrahman, Florian Alt, Tilman Dingler, Christopher Hadnagy, Abbie Maroño, Verena Distler |
Defining and Fortifying Against Cognitive Vulnerabilities in Social Engineering (Dagstuhl Seminar 23462). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Dagstuhl Reports ![In: Dagstuhl Reports 13(11), pp. 103-129, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid |
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Hum. Comput. Interact. ![In: Proc. ACM Hum. Comput. Interact. 7(CSCW2), pp. 1-21, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Lukman Adewale Ajao, Simon Tooswem Apeh |
Secure edge computing vulnerabilities in smart cities sustainability using petri net and genetic algorithm-based reinforcement learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intell. Syst. Appl. ![In: Intell. Syst. Appl. 18, pp. 200216, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Vincent Werner, Laurent Maingault, Marie-Laure Potet |
An end-to-end approach to identify and exploit multi-fault injection vulnerabilities on microcontrollers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 13(2), pp. 149-165, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ivan Palamà, Alessandro Amici, Gabriele Bellicini, Francesco Gringoli, Fabio Pedretti, Giuseppe Bianchi 0001 |
Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 212, pp. 129-140, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Barbara Guidi, Andrea Michienzi |
Delving NFT vulnerabilities, a sleepminting prevention system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(29), pp. 46065-46084, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yuqin Dou, Chongyan Gu, Chenghua Wang, Weiqiang Liu 0001, Fabrizio Lombardi |
Security and Approximation: Vulnerabilities in Approximation-Aware Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Emerg. Top. Comput. ![In: IEEE Trans. Emerg. Top. Comput. 11(1), pp. 265-271, January - March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yu Chen, Zulie Pan, Yuanchao Chen, Yuwei Li |
DISOV: Discovering Second-Order Vulnerabilities Based on Web Application Property Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(2), pp. 133-145, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Aurelien T. Mozipo, John M. Acken |
Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Comput. Digit. Tech. ![In: IET Comput. Digit. Tech. 17(3-4), pp. 75-88, May-July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer |
IoT Vulnerabilities and Attacks: SILEX Malware Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 15(11), pp. 1978, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Quecheng Qiu, Xuyang Zhang, Shunyi Yao, Yu'an Chen, Guangda Chen, Bei Hua, Jianmin Ji |
Training a Non-Cooperator to Identify Vulnerabilities and Improve Robustness for Robot Navigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Robotics Autom. Lett. ![In: IEEE Robotics Autom. Lett. 8(8), pp. 4465-4472, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Omar Flor-Unda, Freddy Simbaña, Xavier Larriva-Novo, Ángel Acuña, Rolando Tipán, Patricia Acosta-Vargas |
A Comprehensive Analysis of the Worst Cybersecurity Vulnerabilities in Latin America. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatics ![In: Informatics 10(3), pp. 71, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yu-Han Lu, Sandy Hsin-Yu Hsiao, Chi-Yu Li 0001, Yi-Chen Hsieh, Po-Yi Chou, Yao-Yu Li, Tian Xie, Guan-Hua Tu |
Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 31(2), pp. 800-815, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Paolo D'Arco, Zahra Ebadi Ansaroudi, Francesco Mogavero |
Multi-stage Proof-of-Works: Properties and vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 976, pp. 114108, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique 0001 |
SeVuc: A study on the Security Vulnerabilities of Capsule Networks against adversarial attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microprocess. Microsystems ![In: Microprocess. Microsystems 96, pp. 104738, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Konstantinos Charmanas, Nikolaos Mittas, Lefteris Angelis |
Exploitation of Vulnerabilities: A Topic-Based Machine Learning Framework for Explaining and Predicting Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. ![In: Inf. 14(7), pp. 403, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Cainã Figueiredo, João Gabriel Lopes de Oliveira, Rodrigo Azevedo Santos, Daniel Vieira, Lucas Miranda, Gerson Zaverucha, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché |
A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 20(3), pp. 3782-3802, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Wangyang Yu, Lu Liu 0001, Xiaoming Wang 0001, Ovidiu Bagdasar, John Panneerselvam |
Modeling and Analyzing Logic Vulnerabilities of E-Commerce Systems at the Design Phase. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 53(12), pp. 7719-7731, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xingxin Pan, Zeynep H. Coban Akdemir, Ruixuan Gao, Xiaoqian Jiang, Gloria M. Sheynkman, Erxi Wu, Jason H. Huang, Nidhi Sahni, S. Stephen Yi |
AD-Syn-Net: systematic identification of Alzheimer's disease-associated mutation and co-mutation vulnerabilities via deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Briefings Bioinform. ![In: Briefings Bioinform. 24(2), March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ioannis Zografopoulos, Nikos D. Hatziargyriou, Charalambos Konstantinou |
Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 17(4), pp. 6695-6709, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo |
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Surv. Tutorials ![In: IEEE Commun. Surv. Tutorials 25(4), pp. 2654-2713, Fourthquarter 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sara Palacios Chavarro, Pantaleone Nespoli, Daniel Díaz López, Yury Niño Roa |
On the Way to Automatic Exploitation of Vulnerabilities and Validation of Systems Security through Security Chaos Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Big Data Cogn. Comput. ![In: Big Data Cogn. Comput. 7(1), pp. 1, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Prarna Mehta, Shubhangi Aggarwal, Abhishek Tandon |
The Effect of Topic Modelling on Prediction of Criticality Levels of Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 47(6), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Daniel A. Sepulveda Estay |
A system dynamics, epidemiological approach for high-level cyber-resilience to zero-day vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Simulation ![In: J. Simulation 17(1), pp. 1-16, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Alexandru Oarga, Bridget Bannerman, Jorge Júlvez |
CONTRABASS: exploiting flux constraints in genome-scale models for the detection of vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bioinform. ![In: Bioinform. 39(2), February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | G. S. Kubrin, Peter D. Zegzhda |
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. Control. Comput. Sci. ![In: Autom. Control. Comput. Sci. 57(8), pp. 947-957, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Emanuele Iannone, Roberta Guadagni, Filomena Ferrucci, Andrea De Lucia, Fabio Palomba |
The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 49(1), pp. 44-63, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xi Xu, Qinghua Zheng, Zheng Yan 0002, Ming Fan 0002, Ang Jia, Zhaohui Zhou, Haijun Wang, Ting Liu 0002 |
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 49(12), pp. 5279-5294, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zimin Chen, Steve Kommrusch, Martin Monperrus |
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 49(1), pp. 147-165, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mahnoor Shahid |
Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.14451, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Moritz Mock |
Utilization of machine learning for the detection of self-admitted vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.15619, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Li Zhong |
A Survey of Prevent and Detect Access Control Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.10600, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zhuzhu Wang, Ying Wang |
NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.08226, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jingfeng Zhang, Bo Song, Bo Han 0003, Lei Liu, Gang Niu 0001, Masashi Sugiyama |
Assessing Vulnerabilities of Adversarial Learning Algorithm through Poisoning Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.00399, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hossein Hajipour, Thorsten Holz, Lea Schönherr, Mario Fritz |
Systematically Finding Security Vulnerabilities in Black-Box Code Generation Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.04012, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sicong Cao, Biao He, Xiaobing Sun 0001, Yu Ouyang, Chao Zhang 0008, Xiaoxue Wu, Ting Su 0001, Lili Bo, Bin Li 0006, Chuanlei Ma, Jiajia Li, Tao Wei |
ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.04233, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Abodh Poudyal, Shishir Lamichhane, Charlotte Wertz, Sajjad Uddin Mahmud, Anamika Dubey |
Hurricane and Storm Surges-Induced Power System Vulnerabilities and their Socioeconomic Impact. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.15118, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis 0001 |
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.10965, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Maximilian Mozes, Xuanli He, Bennett Kleinberg, Lewis D. Griffin |
Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.12833, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sarthak Roy, Ashish Harshavardhan, Animesh Mukherjee 0001, Punyajoy Saha |
Probing LLMs for hate speech detection: strengths and vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.12860, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Tyler Cultice, Himanshu Thapliyal |
Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.12235, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Paschal C. Amusuo, Kyle A. Robinson, Santiago Torres-Arias, Laurent Simon, James C. Davis 0001 |
Preventing Supply Chain Vulnerabilities in Java with a Fine-Grained Permission Manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.14117, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Tong Liu, Zizhuang Deng, Guozhu Meng, Yuekang Li, Kai Chen |
Demystifying RCE Vulnerabilities in LLM-Integrated Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.02926, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun 0001, Shuang Hao, Haojin Zhu, Minhui Xue |
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.08230, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | George Kour, Marcel Zalmanovici, Naama Zwerdling, Esther Goldbraich, Ora Nova Fandina, Ateret Anaby-Tavor, Orna Raz, Eitan Farchi |
Unveiling Safety Vulnerabilities of Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.04124, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zihan Guan 0001, Mengxuan Hu, Zhongliang Zhou, Jielu Zhang, Sheng Li 0001, Ninghao Liu |
BadSAM: Exploring Security Vulnerabilities of SAM via Backdoor Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.03289, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Aysha Thahsin Zahir Ismail, Raj Mani Shukla |
Analyzing the vulnerabilities in SplitFed Learning: Assessing the robustness against Data Poisoning Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.03197, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo |
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.10309, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Kelsey Nelson, Javad Mohammadi, Yu Chen 0002, Erik Blasch, Alex Aved, David Ferris, Erika Ardiles-Cruz, Philip Morrone |
Electric Vehicle Aggregation Review: Benefits and Vulnerabilities of Managing a Growing EV Fleet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.17069, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner |
The CURE To Vulnerabilities in RPKI Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.01872, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran |
Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.16153, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Marwan Omar |
Detecting software vulnerabilities using Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.11773, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer |
Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.01321, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Lingbo Mo, Boshi Wang, Muhao Chen, Huan Sun 0001 |
How Trustworthy are Open-Source LLMs? An Assessment under Malicious Demonstrations Shows their Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.09447, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yuqiang Sun 0001, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu 0003 |
When GPT Meets Program Analysis: Towards Intelligent Detection of Smart Contract Logic Vulnerabilities in GPTScan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.03314, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sander Schulhoff, Jeremy Pinto, Anaum Khan, Louis-François Bouchard, Chenglei Si, Svetlina Anati, Valen Tagliabue, Anson Liu Kost, Christopher Carnahan, Jordan L. Boyd-Graber |
Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.16119, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yimika Erinle, Yathin Kethepalli, Yebo Feng, Jiahua Xu |
SoK: Design, Vulnerabilities and Defense of Cryptocurrency Wallets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.12874, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jiawen Shi, Yixin Liu, Pan Zhou, Lichao Sun 0001 |
BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.12298, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ravil Mussabayev |
Dissecting Code Vulnerabilities: Insights from C++ and Java Vulnerability Analysis with ReVeal Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.11454, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Stefan-Claudiu Susan, Andrei Arusoaie |
Identifying Vulnerabilities in Smart Contracts using Interval Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FROM ![In: Proceedings 7th Symposium on Working Formal Methods, FROM 2023, Bucharest, Romania, 21-22 September 2023., pp. 144-151, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | M. Xie, T. Rahat, W. Wang, Y. Tian |
Using Program Knowledge Graph to Uncover Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.04818, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mst. Shapna Akter, Md. Jobair Hossain Faruk, Nafisa Anjum, Mohammad Masum, Hossain Shahriar, Akond Rahman, Fan Wu 0013, Alfredo Cuzzocrea |
Software Supply Chain Vulnerabilities Detection in Source Code: Performance Comparison between Traditional and Quantum Machine Learning Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.08060, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Nate Haris, Kendree Chen, Ann Song, Benjamin Pou |
Finding Vulnerabilities in Mobile Application APIs: A Modular Programmatic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.14137, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mst. Shapna Akter, Hossain Shahriar, Iysa Iqbal, Md Faruque Hossain, M. A. Karim, Victor Clincy, Razvan Voicu |
Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks using a Malware Dataset: A Comparative Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.19593, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Anders Mølmen Høst, Pierre Lison, Leon Moonen |
Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.00382, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey |
A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.09057, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | M. Mehdi Kholoosi, Muhammad Ali Babar 0001, Cemal Yilmaz |
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.11862, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | MD Asibul Hasan, Md. Mijanur Rahman |
Minimize Web Applications vulnerabilities through the early Detection of CRLF Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.02567, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yueqing Liang, Lu Cheng 0001, Ali Payani, Kai Shu |
Beyond Detection: Unveiling Fairness Vulnerabilities in Abusive Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.09428, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chihiro Kado, Naoto Yanai, Jason Paul Cruz, Kyosuke Yamashita, Shingo Okamura |
An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities in Ethereum Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.04250, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Janislley Oliveira de Sousa, Bruno Carvalho de Farias, Thales Araujo da Silva, Eddie Batista de Lima Filho, Lucas C. Cordeiro |
Finding Software Vulnerabilities in Open-Source C Projects via Bounded Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.05281, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Pengcheng Fang, Peng Gao 0008, Yun Peng, Qingzhao Zhang, Tao Xie 0001, Dawn Song, Prateek Mittal, Sanjeev R. Kulkarni, Zhuotao Liu, Xusheng Xiao |
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.08912, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Davide Corradini, Michele Pasqua, Mariano Ceccato |
Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.01261, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Dongyu Yao, Jianshu Zhang, Ian G. Harris, Marcel Carlsson |
FuzzLLM: A Novel and Universal Fuzzing Framework for Proactively Discovering Jailbreak Vulnerabilities in Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.05274, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hadi Eskandari, Michael Bewong, Sabih ur Rehman |
OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.10511, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Erfan Shayegani, Md Abdullah Al Mamun, Yu Fu, Pedram Zaree, Yue Dong, Nael B. Abu-Ghazaleh |
Survey of Vulnerabilities in Large Language Models Revealed by Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.10844, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Andrés Domínguez Hernández, Kopo M. Ramokapane, Partha Das Chowdhury, Ola Aleksandra Michalec, Emily Johnstone, Emily Godwin, Alicia G. Cork, Awais Rashid |
Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, Ambivalences and Opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.02332, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sagar Babu Mitikiri, K. Victor Sam Moses Babu, Divyanshi Dwivedi, Vedantham Lakshmi Srinivas, Pratyush Chakraborty, Pradeep Kumar Yemula, Mayukha Pal |
Modelling of the Electric Vehicle Charging Infrastructure as Cyber Physical Power Systems: A Review on Components, Standards, Vulnerabilities and Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.08656, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ao-Xiang Zhang, Yu Ran, Weixuan Tang, Yuan-Gen Wang |
Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.13609, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xuandong Zhao, Kexun Zhang, Yu-Xiang Wang 0003, Lei Li 0005 |
Generative Autoencoders as Watermark Attackers: Analyses of Vulnerabilities and Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.01953, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chaozheng Wang, Zongjie Li, Yun Peng, Shuzheng Gao, Sirong Chen, Shuai Wang 0011, Cuiyun Gao, Michael R. Lyu |
REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.08115, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Boyang Zhang, Zheng Li 0023, Ziqing Yang 0002, Xinlei He, Michael Backes 0001, Mario Fritz, Yang Zhang 0016 |
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.12665, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Guilhem Lacombe, David Féliot, Etienne Boespflug, Marie-Laure Potet |
Combining static analysis and dynamic symbolic execution in a toolchain to detect fault injection vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.03999, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yi Wu, Nan Jiang 0012, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan 0001, Petr Babkin, Sameena Shah |
How Effective Are Neural Networks for Fixing Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.18607, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Michael Fu, Chakkrit Tantithamthavorn, Trung Le, Yuki Kume, Van Nguyen 0002, Dinh Phung 0001, John C. Grundy |
AIBugHunter: A Practical Tool for Predicting, Classifying and Repairing Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.16615, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li 0001 |
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.03202, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice |
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.08153, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yusuke Kawamoto 0001, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa |
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.07474, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha |
Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.00234, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro |
OpenSCV: An Open Hierarchical Taxonomy for Smart Contract Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.14523, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yuyang Han, Xu Ji, Zhiqiang Wang 0006, Jianyi Zhang |
Systematic Analysis of Security and Vulnerabilities in Miniapps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.11382, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer |
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.02102, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | André Storhaug, Jingyue Li, Tianyuan Hu |
Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.09826, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Lyuye Zhang, Chengwei Liu, Sen Chen 0001, Zhengzi Xu, Lingling Fan 0003, Lida Zhao, Yiran Zhang, Yang Liu 0003 |
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.03419, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jiahao Li |
Metamorphic Testing for Smart Contract Vulnerabilities Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.03179, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin 0001 |
MISA: Unveiling the Vulnerabilities in Split Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.11026, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed |
Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.11906, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Inga Strümke, Marija Slavkovik 0001, Clemens Stachl |
Against Algorithmic Exploitation of Human Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.04993, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jonathan M. Spring |
An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.09259, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 4178 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|