|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1767 occurrences of 913 keywords
|
|
|
Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Pattaraporn Sangaroonsilp, Hoa Khanh Dam, Aditya Ghose |
On Privacy Weaknesses and Vulnerabilities in Software Systems. |
ICSE |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie A. Williams |
Do Software Security Practices Yield Fewer Vulnerabilities? |
ICSE-SEIP |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Kedi Shen, Yun Zhang, Lingfeng Bao, Zhiyuan Wan, Zhuorong Li, Minghui Wu 0001 |
Patchmatch: A Tool for Locating Patches of Open Source Project Vulnerabilities. |
ICSE Companion |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Christian Clay, Mohammad Khan, Biju Bajracharya |
A Look into the Vulnerabilities of Automatic Dependent Surveillance-Broadcast. |
CCWC |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xueyan Tang, Yuying Du, Zhengyang Wang, Shawn Chong |
EIP Security Analysis: Application Program Standards, Attack Events, and Security Vulnerabilities. |
EITCE |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sharmin Akter Mim, Roksana Rahman, Md. Rashid Al Asif, Khondokar Fida Hasan, Rahamatullah Khondoker |
Cybersecurity Attacks and Vulnerabilities During COVID-19. |
AINA (3) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Adhishree Kathikar, Aishwarya Nair, Ben Lazarine, Agrim Sachdeva, Sagar Samtani |
Assessing the Vulnerabilities of the Open-Source Artificial Intelligence (AI) Landscape: A Large-Scale Analysis of the Hugging Face Platform. |
ISI |
2023 |
DBLP DOI BibTeX RDF |
|
11 | George Chalhoub, Andrew Martin 0002 |
But is it exploitable? Exploring how Router Vendors Manage and Patch Security Vulnerabilities in Consumer-Grade Routers. |
EuroUSEC |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Nitin Kumar Tyagi, Mukta Goyal |
Investigating Security Vulnerabilities and Tools of Blockchain Smart Contract: A Review. |
IC3 |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ala Mughaid, Ibrahim Obeidat, Andaleeb Shdaifat, Razan Alhayjna, Shadi AlZu'bi |
Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning. |
FMEC |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chia-Cheng Tsai, Cheng-Chieh Lin, Shih-Wei Liao |
Unveiling Vulnerabilities in DAO: A Comprehensive Security Analysis and Protective Framework. |
Blockchain |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Fidan Bozkurt, Mustafa Kara, Muhammed Ali Aydin, Hasan Hüseyin Balik |
Exploring the Vulnerabilities and Countermeasures of SSL/TLS Protocols in Secure Data Transmission Over Computer Networks. |
IDAACS |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Oles Yudin, Vyacheslav Kharchenko, Vladimir Pevnev |
Scanning of Web-Applications: Algorithms and Software for Search of Vulnerabilities "Code Injection" and "Insecure Design". |
IDAACS |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Oleksii Neretin, Vyacheslav Kharchenko, Herman Fesenko |
Multi-source Analysis of AI Vulnerabilities: Methodology and Algorithms of Data Collection. |
IDAACS |
2023 |
DBLP DOI BibTeX RDF |
|
11 | David Reid, Kristiina Rahkema, James Walden |
Large Scale Study of Orphan Vulnerabilities in the Software Supply Chain. |
PROMISE |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Marija Brkic, Horia-Stefan Dinu, Alida Mirkovic, Alma Sabirovic, Sajjad Khan, Davor Svetinovic |
Cyber Vulnerabilities in Blockchain Electronic Health Records: An In-Depth Threat Analysis. |
DASC/PiCom/CBDCom/CyberSciTech |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Giuseppe Beltrano, Claudia Greco, Michele Ianni, Giancarlo Fortino |
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications. |
DASC/PiCom/CBDCom/CyberSciTech |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jorge Martins, Ibéria Medeiros, Bernardo Ferreira |
Code Privacy in Detection of Web Vulnerabilities. |
EASE |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Alberto Schiaffino, Matteo Reina, Ricardo Anibal Matamoros Aragon, Alessandro Solinas, Francesco Epifania |
Detecting Zero-Day Vulnerabilities in CMS Platforms: An In-depth Analysis Using DeepLog. |
AIABI@AI*IA |
2023 |
DBLP BibTeX RDF |
|
11 | Nima Shiri Harzevili, Jiho Shin, Junjie Wang 0001, Song Wang 0009, Nachiappan Nagappan |
Characterizing and Understanding Software Security Vulnerabilities in Machine Learning Libraries. |
MSR |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yuyang Han, Xu Ji, Zhiqiang Wang 0006, Jianyi Zhang |
Systematic Analysis of Security and Vulnerabilities in Miniapps. |
SaTS@CCS |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jianjia Yu, Zifeng Kang, Yinzhi Cao |
MiniTaintDev: Unveiling Mini-App Vulnerabilities through Dynamic Taint Analysis. |
SaTS@CCS |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Karan Bhanot, Ioana Baldini, Dennis Wei, Jiaming Zeng, Kristin P. Bennett |
Stress-Testing Bias Mitigation Algorithms to Understand Fairness Vulnerabilities. |
AIES |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Matteo Esposito, Sergio Moreschini, Valentina Lenarduzzi, David Hästbacka, Davide Falessi |
Can We Trust the Default Vulnerabilities Severity? |
SCAM |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Wenbo Ding, Song Liao, Keyan Guo, Fuqiang Zhang, Long Cheng 0005, Ziming Zhao 0001, Hongxin Hu |
Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles. |
SmartSP |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jiaqi He, Revan MacQueen, Natalie Bombardieri, Karim Ali 0001, James R. Wright, Cristina Cifuentes |
Finding an Optimal Set of Static Analyzers To Detect Software Vulnerabilities. |
ICSME |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Venkata Venugopal Rao Gudlur |
Fintech Future Business & Cyber Vulnerabilities and Challenges. |
ICSECS |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Kobra Khanmohammadi, Raphaël Khoury |
Half-Day Vulnerabilities: A study of the First Days of CVE Entries. |
CAMLIS |
2023 |
DBLP BibTeX RDF |
|
11 | Pingyan Wang, Shaoying Liu |
Detecting Security Vulnerabilities in Human-Machine Pair Programming with Pointer Analysis. |
ICECCS |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Wenlin Xu, Tong Li 0004, Jinsong Wang, Tao Fu, Yahui Tang |
Detecting Software Vulnerabilities Based on Hierarchical Graph Attention Network. |
CICAI (2) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang 0017, Hongxin Hu, Ziming Zhao 0001 |
Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense. |
DAC |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chang Liu, Yongqiang Lyu 0001, Haixia Wang 0001, Pengfei Qiu, Dapeng Ju, Gang Qu 0001, Dongsheng Wang 0002 |
Leaky MDU: ARM Memory Disambiguation Unit Uncovered and Vulnerabilities Exposed. |
DAC |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Gaku Tatebatake, Shingo Yamaguchi |
Network Hardening Method by Cutting and Re-Linking Based on Exclusive Vulnerabilities. |
GCCE |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus, Aylin Yener |
Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks. |
CISS |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Lyracelle Acosta, Seyed Ebrahim Hosseini, Shahbaz Pervez |
Ethical Challenges Associated with Security Vulnerabilities and Data Privacy in Social Networking. |
DeSE |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sri Hrushikesh Varma Bhupathiraju, Jennifer Sheldon, Luke A. Bauer, Vincent Bindschaedler, Takeshi Sugawara 0001, Sara Rampazzi |
EMI-LiDAR: Uncovering Vulnerabilities of LiDAR Sensors in Autonomous Driving Setting using Electromagnetic Interference. |
WISEC |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Aysegul Bumin, Megan Shah, Kejun Huang, Tamer Kahveci |
Vulture: VULnerabilities in impuTing drUg REsistance. |
BCB |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xin Sun, Zixiang Wang |
Intelligent Association of CVE Vulnerabilities Based on Chain Reasoning. |
CAIBDA |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sajath Sathar, Saif Al-Kuwari, Abdullatif Albaseer, Marwa K. Qaraqe, Mohamed Abdallah 0001 |
Mitigating IEC-60870-5-104 Vulnerabilities: Anomaly Detection in Smart Grid based on LSTM Autoencoder. |
ISNCC |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mst. Shapna Akter, Hossain Shahriar, Iysa Iqbal, Md Faruque Hossain, M. A. Karim, Victor Clincy, Razvan Voicu |
Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks Using a Malware Dataset: A Comparative Analysis. |
SSE |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Abhishek Kumar Mishra |
Revealing and exploiting privacy vulnerabilities in users' public wireless packets. (Révéler et exploiter les vulnérabilités liées à confidentialité dans les paquets sans fil publics des utilisateurs). |
|
2023 |
RDF |
|
11 | Sanjay Kariyappa |
Understanding and Mitigating Privacy Vulnerabilities in Deep Learning. |
|
2023 |
RDF |
|
11 | Rongze Xu, Zhanyong Tang, Guixin Ye, Huanting Wang, Xin Ke, Dingyi Fang, Zheng Wang 0001 |
Detecting code vulnerabilities by learning from large-scale open source repositories. |
J. Inf. Secur. Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Jaimandeep Singh, Naveen Kumar Chaudhary |
OAuth 2.0 : Architectural design augmentation for mitigation of common security vulnerabilities. |
J. Inf. Secur. Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Shailendra Mishra |
Cyber-security threats and vulnerabilities in 4G/5G network enabled systems. |
Int. J. Comput. Sci. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | F. Aktürk, F. Aras, S. Çeribasi |
Dynamic Response and Seismic Vulnerabilities of the Historic Tophane-i Amire: Dynamic and Seismic Analysis of a Historic Masonry Building. |
ACM Journal on Computing and Cultural Heritage |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Pablo José Hueros-Barrios, Francisco Javier Rodríguez Sanchez, Pedro Martín, Carlos Jiménez, Ignacio Fernández |
Addressing the cybersecurity vulnerabilities of advanced nanogrids: A practical framework. |
Internet Things |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Kristin Barber, Moein Ghaniyoun, Yinqian Zhang, Radu Teodorescu |
A Pre-Silicon Approach to Discovering Microarchitectural Vulnerabilities in Security Critical Applications. |
IEEE Comput. Archit. Lett. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Marc Rennhard, Malte Kushnir, Olivier Favre, Damiano Esposito, Valentin Zahnd |
Automating the Detection of Access Control Vulnerabilities in Web Applications. |
SN Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab |
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. |
Int. J. Inf. Sec. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Gurpreet Kaur, Rekha Agarwal, Vinod Patidar |
Image encryption using fractional integral transforms: Vulnerabilities, threats, and future scope. |
Frontiers Appl. Math. Stat. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson 0002, Engin Kirda, Manuel Egele |
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. |
ACM Trans. Priv. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Le Qin, Fei Peng, Min Long, Raghavendra Ramachandra, Christoph Busch 0001 |
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study. |
ACM Trans. Priv. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes, Christos D. Zaroliagis |
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations. |
Cryptogr. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Jiadong Lu, Fangming Gu, Yiqi Wang, Jiahui Chen 0002, Zhiniang Peng, Sheng Wen |
Static Detection of File Access Control Vulnerabilities on Windows System. |
Concurr. Comput. Pract. Exp. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Ibéria Medeiros, Nuno Neves 0001, Miguel Correia 0001 |
Statically Detecting Vulnerabilities by Processing Programming Languages as Natural Languages. |
IEEE Trans. Reliab. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Bixin Li, Zhenyu Pan, Tianyuan Hu |
ReDefender: Detecting Reentrancy Vulnerabilities in Smart Contracts Automatically. |
IEEE Trans. Reliab. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani |
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. |
ISC Int. J. Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Ahmed Zerouali, Tom Mens, Alexandre Decan, Coen De Roover |
On the impact of security vulnerabilities in the npm and RubyGems dependency networks. |
Empir. Softw. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie A. Williams |
Do I really need all this work to find vulnerabilities? |
Empir. Softw. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Haozhe Zhou, Amin Milani Fard, Adetokunbo Makanju |
The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support. |
J. Cybersecur. Priv. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Andrea Lisi, Prateeti Mukherjee, Laura De Santis, Lei Wu, Dmitrij Lagutin, Yki Kortesniemi |
Automated Responsible Disclosure of Security Vulnerabilities. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Kamalanathan Kandasamy, Sethuraman Srinivas, Krishnashree Achuthan, P. Venkat Rangan |
Digital Healthcare - Cyberattacks in Asian Organizations: An Analysis of Vulnerabilities, Risks, NIST Perspectives, and Recommendations. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Fatimah K. Aljaafari, Rafael Menezes, Edoardo Manino, Fedor Shmarov, Mustafa A. Mustafa, Lucas C. Cordeiro |
Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis |
HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Mikhail Zolotukhin, Parsa Miraghaei, Di Zhang 0004, Timo Hämäläinen 0002 |
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Raghavendra Rao Althar, Debabrata Samanta, Manjit Kaur, Dilbag Singh, Heung-No Lee |
Automated Risk Management Based Software Security Vulnerabilities Management. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Razvan Raducu, Ricardo J. Rodríguez, Pedro Álvarez 0001 |
Defense and Attack Techniques Against File-Based TOCTOU Vulnerabilities: A Systematic Review. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Satpal Singh Kushwaha, Sandeep Joshi, Dilbag Singh, Manjit Kaur, Heung-No Lee |
Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Daojing He, Xiaohu Yu, Tinghui Li, Sammy Chan, Mohsen Guizani |
Firmware Vulnerabilities Homology Detection Based on Clonal Selection Algorithm for IoT Devices. |
IEEE Internet Things J. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Fadhila Tlili, Lamia Chaari Fourati, Samiha Ayed, Bassem Ouni |
Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures. |
Ad Hoc Networks |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sandeep Kautish, A. Reyana, Ankit Vidyarthi |
SDMTA: Attack Detection and Mitigation Mechanism for DDoS Vulnerabilities in Hybrid Cloud Environment. |
IEEE Trans. Ind. Informatics |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Pooja Anand, Yashwant Singh, Arvind Kumar Selwal, Pradeep Kumar Singh 0001, Kayhan Zrar Ghafoor |
IVQFIoT: An intelligent vulnerability quantification framework for scoring internet of things vulnerabilities. |
Expert Syst. J. Knowl. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Kavita Sharma 0001 |
Internet of healthcare things security vulnerabilities and jamming attack analysis. |
Expert Syst. J. Knowl. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Francesca Righetti, Carlo Vallati, Marco Tiloca, Giuseppe Anastasi |
Vulnerabilities of the 6P protocol for the Industrial Internet of Things: Impact analysis and mitigation. |
Comput. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Samuele Germiniani, Alessandro Danese, Graziano Pravadelli |
Automatic Generation of Assertions for Detection of Firmware Vulnerabilities Through Alignment of Symbolic Sequences. |
IEEE Trans. Emerg. Top. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Shubham Rai, Satwik Patnaik, Ansh Rupani, Johann Knechtel, Ozgur Sinanoglu, Akash Kumar 0001 |
Security Promises and Vulnerabilities in Emerging Reconfigurable Nanotechnology-Based Circuits. |
IEEE Trans. Emerg. Top. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Blazhe Gjorgiev, Giovanni Sansavini |
Identifying and assessing power system vulnerabilities to transmission asset outages via cascading failure analysis. |
Reliab. Eng. Syst. Saf. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Wei Wang 0279, Gregorio Cova, Enrico Zio |
A clustering-based framework for searching vulnerabilities in the operation dynamics of Cyber-Physical Energy Systems. |
Reliab. Eng. Syst. Saf. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Jun Yang, Leixiong Huang, Haoming Ma, Zhihui Xu, Ming Yang, Shaoqiang Guo |
A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems. |
Int. J. Crit. Infrastructure Prot. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Abdullah M. Algarni, Vijey Thayananthan |
Autonomous Vehicles: The Cybersecurity Vulnerabilities and Countermeasures for Big Data Communication. |
Symmetry |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sundarakrishnan Ganesh, Francis Palma, Tobias Olsson |
Are Source Code Metrics "Good Enough" in Predicting Security Vulnerabilities? |
Data |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Alden Hilton, Joel Hirschmann, Casey T. Deccio |
Beware of IPs in Sheep's Clothing: Measurement and Disclosure of IP Spoofing Vulnerabilities. |
IEEE/ACM Trans. Netw. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Chia-Cheng Yen, Dipak Ghosal, H. Michael Zhang, Chen-Nee Chuah |
Security Vulnerabilities and Protection Algorithms for Backpressure-Based Traffic Signal Control at an Isolated Intersection. |
IEEE Trans. Intell. Transp. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sagar Samtani, Yidong Chai, Hsinchun Chen |
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model. |
MIS Q. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Azfar Khalid, Zeashan Hameed Khan, Muhammad Idrees, Pierre T. Kirisci, Zied Ghrairi, Klaus-Dieter Thoben, Jürgen Pannek |
Understanding vulnerabilities in cyber physical production systems. |
Int. J. Comput. Integr. Manuf. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Yuze Wang, Peng Liu 0016, Weidong Wang, Xiaohang Wang 0001, Yingtao Jiang |
On a Consistency Testing Model and Strategy for Revealing RISC Processor's Dark Instructions and Vulnerabilities. |
IEEE Trans. Computers |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Xingyu Meng, Shamik Kundu, Arun K. Kanuparthi, Kanad Basu |
RTL-ConTest: Concolic Testing on RTL for Detecting Security Vulnerabilities. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Faiq Khalid, Imran Hafeez Abbassi, Semeen Rehman, Awais Mehmood Kamboh, Osman Hasan, Muhammad Shafique 0001 |
ForASec: Formal Analysis of Hardware Trojan-Based Security Vulnerabilities in Sequential Circuits. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Abdul Razaque, Syed Rizvi 0001, Meer Jaro Khan, Muder Almiani, Amer Al-Rahayfeh |
State-of-art review of information diffusion models and their impact on social network vulnerabilities. |
J. King Saud Univ. Comput. Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Abdalla Wasef Marashdih, Zarul Fitri Zaaba, Khaled Suwais |
Predicting input validation vulnerabilities based on minimal SSA features and machine learning. |
J. King Saud Univ. Comput. Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Roman V. Baev, Leonid V. Skvortsov, Evgeny A. Kudryashov, Ruben Buchatskiy, Roman Zhuykov |
Preventing Vulnerabilities Caused by Optimization of Code with Undefined Behavior. |
Program. Comput. Softw. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Di Xiao, Hani Jieun Kim, Ignatius Pang, Pengyi Yang |
Functional analysis of the stable phosphoproteome reveals cancer vulnerabilities. |
Bioinform. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Yury V. Kosolapov |
Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code. |
Autom. Control. Comput. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Wentao Wang 0003, Faryn Dumont, Nan Niu, Glen Horton |
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis. |
IEEE Trans. Software Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Fuchen Ma, Zhenyang Xu, Meng Ren, Zijing Yin, Yuanliang Chen, Lei Qiao, Bin Gu 0006, Huizhong Li, Yu Jiang 0001, Jia-Guang Sun 0001 |
Pluto: Exposing Vulnerabilities in Inter-Contract Scenarios. |
IEEE Trans. Software Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Morteza Verdi, Ashkan Sami, Jafar Akhondali, Foutse Khomh, Gias Uddin 0001, Alireza Karami Motlagh |
An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. |
IEEE Trans. Software Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Zhen Huang 0002, Gang Tan, Xiaowei Yu |
Mitigating Vulnerabilities in Closed Source Software. |
EAI Endorsed Trans. Security Safety |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Nitin Pundir, Sohrab Aftabjahani, Rosario Cammarota, Mark M. Tehranipoor, Farimah Farahmandi |
Analyzing Security Vulnerabilities Induced by High-level Synthesis. |
ACM J. Emerg. Technol. Comput. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Sigi Goode, David Lacey |
Exploiting organisational vulnerabilities as dark knowledge: conceptual development from organisational fraud cases. |
J. Knowl. Manag. |
2022 |
DBLP DOI BibTeX RDF |
|
|
|