The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Vulnerability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1986 (16) 1987-1992 (26) 1993-1996 (27) 1997-1998 (23) 1999-2000 (30) 2001 (24) 2002 (56) 2003 (86) 2004 (146) 2005 (196) 2006 (227) 2007 (250) 2008 (259) 2009 (209) 2010 (169) 2011 (137) 2012 (165) 2013 (198) 2014 (207) 2015 (226) 2016 (251) 2017 (257) 2018 (342) 2019 (424) 2020 (484) 2021 (581) 2022 (612) 2023 (775) 2024 (155)
Publication types (Num. hits)
article(2504) book(8) data(4) incollection(62) inproceedings(3886) phdthesis(73) proceedings(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1664 occurrences of 928 keywords

Results
Found 6558 publication records. Showing 6558 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Giovane C. M. Moura, John S. Heidemann Vulnerability Disclosure Considered Stressful. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Abubakar Omari Abdallah Semasaba, Wei Zheng 0006, Xiaoxue Wu, Samuel Akwasi Agyemang, Tao Liu, Yuan Ge An empirical evaluation of deep learning-based source code vulnerability detection: Representation versus models. Search on Bibsonomy J. Softw. Evol. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Wei Gao, Qingqing Guo, Ning Jiang Information vulnerability in facial recognition payment: An explanation of technology threat avoidance and information boundary theory. Search on Bibsonomy Electron. Commer. Res. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Junghyun An, Zhan Wang, Inwhee Joe A CNN-based automatic vulnerability detection. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ying Wei, Lili Bo, Xiaojun Wu 0001, Yue Li, Zhenlei Ye, Xiaobing Sun 0001, Bin Li 0006 VulRep: vulnerability repair based on inducing commits and fixing commits. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yan Chen, Mingyang Sun, Zhongda Chu, Simon Camal, Georges Kariniotakis, Fei Teng 0005 Vulnerability and Impact of Machine Learning-Based Inertia Forecasting Under Cost-Oriented Data Integrity Attack. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shahid Ul Haq, Yashwant Singh, Amit Sharma, Rahul Gupta, Dipak Gupta A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks. Search on Bibsonomy Discov. Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Pengcheng Wang, Xinkai Wu, Xiaozheng He 0001 Vibration-Theoretic Approach to Vulnerability Analysis of Nonlinear Vehicle Platoons. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xinzheng Feng, Jun Wu 0001, Ali Kashif Bashir, Jianhua Li 0001, Ao Shen, Mohammad Dahman Alshehri Vulnerability-Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yuechuan Tao, Jing Qiu 0001, Shuying Lai, Xianzhuo Sun, Junhua Zhao 0001 Vulnerability Assessment of Coupled Transportation and Multi-Energy Networks Considering Electric and Hydrogen Vehicles. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Amiel Meiseles, Yair Motro, Lior Rokach, Jacob Moran-Gilad Vulnerability of pangolin SARS-CoV-2 lineage assignment to adversarial attack. Search on Bibsonomy Artif. Intell. Medicine The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Regina Müller, Eva Kuhn, Robert Ranisch, Jonathan Hunger, Nadia Primc Ethics of sleep tracking: techno-ethical particularities of consumer-led sleep-tracking with a focus on medicalization, vulnerability, and relationality. Search on Bibsonomy Ethics Inf. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yan Li, Claudia Caceres, Ali Mohammed Bazarah A Climate Change Vulnerability Assessment Design Framework: The Case of Small-scale Farmers in Western Honduras. Search on Bibsonomy Commun. Assoc. Inf. Syst. The full citation details ... 2023 DBLP  BibTeX  RDF
10Alan C. Jamieson, Chris Few, Kenny Awuson-David, Tawfik Al Hadhrami HVA_CPS proposal: a process for hazardous vulnerability analysis in distributed cyber-physical systems. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ruijin Sun, Shize Guo, Changyou Xing, Yexin Duan, Luming Yang, Xi Guo, Zhisong Pan Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Tao Wen 0003, Jinde Cao, Kang Hao Cheong Gravity-Based Community Vulnerability Evaluation Model in Social Networks: GBCVE. Search on Bibsonomy IEEE Trans. Cybern. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Haojun Wang, Kun Liu 0002, Dongyu Han, Yuanqing Xia Vulnerability analysis of distributed state estimation under joint deception attacks. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jingwei Hao, Senlin Luo, Limin Pan, Chuantao Chen VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network. Search on Bibsonomy Computer The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Francisco Lázaro 0001, Ronald Raulefs, Hannes Bartz, Thomas Jerkovits VDES R-Mode: Vulnerability analysis and mitigation concepts. Search on Bibsonomy Int. J. Satell. Commun. Netw. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jingweijia Tan, Liqi Ping, Qixiang Wang, Kaige Yan Saca-AVF: A Quantitative Approach to Analyze the Architectural Vulnerability Factors of CNN Accelerators. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Truc D. T. Nguyen, My T. Thai Denial-of-Service Vulnerability of Hash-Based Transaction Sharding: Attack and Countermeasure. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Junjun Guo, Kai Long, Kunpeng Yang, Kaida Jiang, Long Lu, Changyuan Wang A novel prediction method for vulnerability outbreak trend. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xiaojun Ren, Yongtang Wu, Jiaqing Li, Dongmin Hao, Muhammad Alam 0002 Smart contract vulnerability detection based on a semantic code structure and a self-designed neural network. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Panchanan Nath, Jaya Rani Mushahary, Ujjal Roy, Maharaj Brahma, Pranav Kumar Singh AI and Blockchain-based source code vulnerability detection and prevention system for multiparty software development. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Bahareh Lashkari, Petr Musilek Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Fredrik Heiding, Sotirios Katsikeas, Robert Lagerström Research communities in cyber security vulnerability assessments: A comprehensive literature review. Search on Bibsonomy Comput. Sci. Rev. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Senrong Xu, Liangyue Li, Zenan Li, Yuan Yao 0001, Feng Xu 0007, Zulong Chen, Quan Lu, Hanghang Tong On the Vulnerability of Graph Learning-based Collaborative Filtering. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Qingkun Zhu Enhancing vulnerability scoring for information security in intelligent computers. Search on Bibsonomy Int. J. Intell. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Michael Thomas Smith, Kathrin Grosse, Michael Backes 0001, Mauricio A. Álvarez Adversarial vulnerability bounds for Gaussian process classification. Search on Bibsonomy Mach. Learn. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Rachad Atat, Muhammad Ismail 0001, Erchin Serpedin Joint Cascade Vulnerability Assessment of Interdependent Power-Water Infrastructures. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Kwang Sik Kim, Jang Hyun Lee, Joon Young Yoon Damage visualization and vulnerability assessment of surface ship considering the 3D multihit location of air-explosion threat. Search on Bibsonomy J. Comput. Des. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Likhitha Mankali, Satwik Patnaik, Nimisha Limaye, Johann Knechtel, Ozgur Sinanoglu VIGILANT: Vulnerability Detection Tool Against Fault-Injection Attacks for Locking Techniques. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Haoyuan Li, Hua Chen 0011, Xucang Han, Weiqiong Cao, Xiang Zhu, Huilong Jiang, Jian Wang Easily Overlooked Vulnerability in Implementation: Practical Fault Attack on ECDSA Round Counter. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Abdalla Wasef Marashdih, Zarul Fitri Zaaba, Khaled Suwais An Enhanced Static Taint Analysis Approach to Detect Input Validation Vulnerability. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Khaled Abdulghaffar, Nebrase Elmrabit, Mehdi Yousefi Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners. Search on Bibsonomy Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yiran Li, Junpeng Wang, Takanori Fujiwara, Kwan-Liu Ma Visual Analytics of Neuron Vulnerability to Adversarial Attacks on Convolutional Neural Networks. Search on Bibsonomy ACM Trans. Interact. Intell. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Patrick Kwaku Kudjo, Selasie Brown Aformaley, Solomon Mensah Improving software vulnerability classification performance using normalized difference measures. Search on Bibsonomy Int. J. Syst. Assur. Eng. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Manuel Huth, Jonas Arruda, Roy Gusinow, Lorenzo Contento, Evelina Tacconelli, Jan Hasenauer Accessibility of covariance information creates vulnerability in Federated Learning frameworks. Search on Bibsonomy Bioinform. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yuwen Zhu, Lei Yu Key Node Identification Based on Vulnerability Life Cycle and the Importance of Network Topology. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Zujia Yan, Yi Zhuang 0002, Weining Zheng, Jingjing Gu Multi-bit Data Flow Error Detection Method Based on SDC Vulnerability Analysis. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Paul Dumouchel Ethics & Robotics, Embodiment and Vulnerability. Search on Bibsonomy Int. J. Soc. Robotics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Michael Fu, Van Nguyen 0002, Chakkrit Kla Tantithamthavorn, Trung Le, Dinh Q. Phung VulExplainer: A Transformer-Based Hierarchical Distillation for Explaining Vulnerability Types. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Chunyong Zhang, Bin Liu, Yang Xin 0001, Liangwei Yao CPVD: Cross Project Vulnerability Detection Based on Graph Attention Network and Domain Adaptation. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia 0001, Ahmed E. Hassan, Xuan-Bach Dinh Le, David Lo 0001 Multi-Granularity Detector for Vulnerability Fixes. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Roland Croft, Yongzheng Xie, Muhammad Ali Babar 0001 Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Peng Qian, Jianting He, Lingling Lu, Siwei Wu, Zhipeng Lu, Lei Wu 0012, Yajin Zhou, Qinming He Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jianlei Chi, Yu Qu, Ting Liu 0002, Qinghua Zheng, Heng Yin 0001 SeqTrans: Automatic Vulnerability Fix Via Sequence to Sequence Learning. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ying Wang 0038, Peng Sun, Lin Pei, Yue Yu 0001, Chang Xu 0001, Shing-Chi Cheung, Hai Yu 0001, Zhiliang Zhu 0001 Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj, Xiapu Luo, Haipeng Cai Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ahmet Okutan, Peter Mell, Mehdi Mirakhorli, Igor Khokhlov, Joanna C. S. Santos, Danielle Gonzalez, Steven Simmons Empirical Validation of Automated Vulnerability Curation and Characterization. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Wuqi Zhang, Lili Wei, Shing-Chi Cheung, Yepang Liu 0001, Shuqing Li, Lu Liu, Michael R. Lyu Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Junwei Zhang, Zhongxin Liu, Xing Hu 0008, Xin Xia 0001, Shanping Li Vulnerability Detection by Learning From Syntax-Based Execution Paths of Code. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Gongping Chen, Hong Wang, Chuanqi Zhang Mobile cellular network security vulnerability detection using machine learning. Search on Bibsonomy Int. J. Inf. Commun. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shihong Chen Vulnerability detection of the authentication protocol in the IOT based on improved wavelet packet. Search on Bibsonomy Int. J. Auton. Adapt. Commun. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Scott Freitas, Diyi Yang, Srijan Kumar, Hanghang Tong, Duen Horng Chau Graph Vulnerability and Robustness: A Survey. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Zhenguang Liu, Peng Qian, Xiaoyang Wang 0002, Yuan Zhuang, Lin Qiu, Xun Wang 0007 Combining Graph Neural Networks With Expert Knowledge for Smart Contract Vulnerability Detection. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10An-An Liu, Heyu Zhou, Xuanya Li, Lanjun Wang Vulnerability of Feature Extractors in 2D Image-Based 3D Object Retrieval. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shashank Agnihotri, Kanchana Vaishnavi Gandikota, Julia Grabinski, Paramanand Chandramouli, Margret Keuper On the unreasonable vulnerability of transformers for image restoration - and an easy fix. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Khadija Hanifi, Ramin Fadaei Fouladi, Basak Gencer Unsalver, Goksu Karadag Software Vulnerability Prediction Knowledge Transferring Between Programming Languages. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Marija Ivanovska, Vitomir Struc On the Vulnerability of DeepFake Detectors to Attacks Generated by Denoising Diffusion Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yunbo Lyu, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li 0005, David Lo 0001 CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Elijah Pelofske, Lorie M. Liebrock, Vincent Urias Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang 0002, Yang Liu 0003, Zhaoquan Gu When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Hakan Temiz, Ahmet Buyukeke An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Ashwin Kallingal Joshy, Mirza Sanjida Alam, Shaila Sharmin, Qi Li, Wei Le ActiveClean: Generating Line-Level Vulnerability Data via Active Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng 0001, Dusit Niyato, Mo-Yuen Chow, Jiming Chen 0001 Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Eduardo Rhod, Behnam Ghavami, Zhenman Fang, Lesley Shannon A Cycle-Accurate Soft Error Vulnerability Analysis Framework for FPGA-based Designs. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Daniel Reti, Karina Elzer, Hans Dieter Schotten SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10 An Optimization Framework for Cyber-Physical Vulnerability Analysis in Industrial Cyber-Physical Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Abshir Ali, Guanqun Song, Ting Zhu Security in 5G Networks - How 5G networks help Mitigate Location Tracking Vulnerability. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Son Nguyen, Thu-Trang Nguyen, Thanh Trong Vu, Thanh-Dat Do, Kien-Tuan Ngo, Hieu Dinh Vo Code-centric Learning-based Just-In-Time Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Soodeh Atefi, Amutheezan Sivagnanam, Afiya Ayman, Jens Grossklags, Aron Laszka The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Xin-Cheng Wen, Yupan Chen, Cuiyun Gao, Hongyu Zhang 0002, Jie M. Zhang, Qing Liao 0001 Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Mohammadhossein Amouei, Mohsen Rezvani, Mansoor Fateh RAT: Reinforcement-Learning-Driven and Adaptive Testing for Vulnerability Discovery in Web Application Firewalls. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yiming Jiang 0010, Jiangfan Zhang Vulnerability of Finitely-long Blockchains in Securing Data. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Christoph Sendner, Lukas Petzi, Jasper Stang, Alexandra Dmitrienko Vulnerability Scanners for Ethereum Smart Contracts: A Large-Scale Study. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jin Wang, Zishan Huang, Hengli Liu, Nianyi Yang, Yinhao Xiao DefectHunter: A Novel LLM-Driven Boosted-Conformer-based Code Vulnerability Detection Mechanism. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Cangxiong Chen, Vinay P. Namboodiri, Julian A. Padget Understanding the Vulnerability of CLIP to Image Compression. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Son Nguyen, Thanh Trong Vu, Hieu Dinh Vo VFFINDER: A Graph-based Approach for Automated Silent Vulnerability-Fix Identification. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jaskaran Singh Walia, Aryan Odugoudar Vulnerability analysis of captcha using Deep learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Roland Croft, Muhammad Ali Babar 0001, M. Mehdi Kholoosi Data Quality for Software Vulnerability Datasets. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jay Jacobs, Sasha Romanosky, Octavian Suciuo, Benjamin Edwards, Armin Sarabi Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Adam Janovsky, Jan Jancar, Petr Svenda, Lukasz Chmielewski, Jiri Michalik, Vashek Matyas sec-certs: Examining the security certification practice for better vulnerability mitigation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Chengran Yang, Zhipeng Zhao, Bowen Xu, Jiayuan Zhou, Xin Xia 0001, Ahmed E. Hassan, Xuan-Bach Dinh Le, David Lo 0001 Multi-Granularity Detector for Vulnerability Fixes. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Michael Fu, Chakkrit Tantithamthavorn, Van Nguyen 0002, Trung Le ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We? Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Shuo Liu, Gail E. Kaiser Vignat: Vulnerability identification by learning code semantics via graph attention networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Yu Nong, Richard Fang, Guangbei Yi, Kunsong Zhao, Xiapu Luo, Feng Chen, Haipeng Cai VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Byung-Kwan Lee, Junho Kim, Yong Man Ro Mitigating Adversarial Vulnerability through Causal Parameter Estimation by Adversarial Double Machine Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Naser Damer, Meiling Fang, Patrick Siebke, Jan Niklas Kolf, Marco Huber, Fadi Boutros MorDIFF: Recognition Vulnerability and Attack Detectability of Face Morphing Attacks Created by Diffusion Autoencoders. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Feng Mi, Chen Zhao 0010, Zhuoyi Wang, Sadaf Md. Halim, Xiaodi Li, Zhouxiang Wu, Latifur Khan, Bhavani Thuraisingham An Automated Vulnerability Detection Framework for Smart Contracts. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Liangxuan Guo, Yang Chen, Shan Yu Out-of-distribution forgetting: vulnerability of continual learning to intra-class distribution shift. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Christoph Sendner, Ruisi Zhang, Alexander Hefter, Alexandra Dmitrienko, Farinaz Koushanfar G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10 VMCDL: Vulnerability Mining Based on Cascaded Deep Learning Under Source Control Flow. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Nima Shiri Harzevili, Alvine Boaye Belle, Junjie Wang 0001, Song Wang 0009, Zhen Ming Jiang, Nachiappan Nagappan A Survey on Automated Software Vulnerability Detection Using Machine Learning and Deep Learning. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Arnaud Valence ICAR, a categorical framework to connect vulnerability, threat and asset managements. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Jingda Yang, Ying Wang Formal and Fuzzing Amplification: Targeting Vulnerability Detection in 5G and Beyond. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Md Mahbubur Rahman, Ira Ceka, Chengzhi Mao, Saikat Chakraborty, Baishakhi Ray, Wei Le Towards Causal Deep Learning for Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
10Michael Wang, Michael Robinson Vulnerability Detection Through an Adversarial Fuzzing Algorithm. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 6558 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license