Results 11 to 20 of about 158,430 (308)

An Intelligent Fuzzing Data Generation Method Based on Deep Adversarial Learning

open access: yesIEEE Access, 2019
Fuzzing (Fuzz testing) can effectively identify security vulnerabilities in software by providing a large amount of unexpected input to the target program. An important part of fuzzing test is the fuzzing data generation.
Zhihui Li   +4 more
doaj   +1 more source

Review on Testing of Cyber Physical Systems: Methods and Testbeds

open access: yesIEEE Access, 2018
Cyber physical systems (CPSs) are rapidly developing, with increasing scale, complexity and heterogeneity. However, testing CPSs systematically to ensure that they operate with high reliability remains a big challenge.
Xin Zhou   +3 more
doaj   +1 more source

Security Aspect in Software Testing Perspective: A Systematic Literature Review

open access: yesJournal of Information Systems Engineering and Business Intelligence, 2023
Background: Software testing and software security have become one of the most important parts of an application. Many studies have explored each of these topics but there is a gap wherein the relation of software security and software testing in general
Halim Wildan Awalurahman   +3 more
doaj   +1 more source

Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary [PDF]

open access: yesJournal of Universal Computer Science, 2023
We study the information-theoretic model of stegosystem with an active adversary, where unlike a passive adversary he can not only read but also write. The legitimate sender as well as the adversary can embed or not a message in the sending data.
Mariam Haroutunian   +2 more
doaj   +3 more sources

Extending MUD Profiles Through an Automated IoT Security Testing Methodology

open access: yesIEEE Access, 2019
Defining the intended behaviour of IoT devices is considered as a key aspect to detect and mitigate potential security attacks. In this direction, the Manufacturer Usage Description (MUD) has been recently standardised to reduce the attack surface of a ...
Sara Nieves Matheu   +3 more
doaj   +1 more source

On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications

open access: yesApplied Sciences, 2020
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for.
Francesc Mateo Tudela   +4 more
doaj   +1 more source

Survey of Model-Based Security Testing Approaches in the Automotive Domain

open access: yesIEEE Access, 2023
Modern connected or autonomous vehicles (AVs) are highly complex cyber-physical systems. As a result of the high number of different technologies and connectivity features involved, testing these systems to identify security vulnerabilities is a big ...
Florian Sommer   +2 more
doaj   +1 more source

Intelligent building construction site safety inspection model based on YOLOX [PDF]

open access: yesArchives of Civil Engineering
The construction industry is a high-risk and high accident rate industry, and it is crucial to conduct safety inspections on construction sites. Therefore, the study introduces an improved YOLOX algorithm and performs lightweight processing such as ...
Hairong Huang   +3 more
doaj   +1 more source

Determination and Analysis of 16 Mycotoxins in Medicinal and Edible Traditional Chinese Medicine

open access: yesShipin gongye ke-ji, 2022
Objective: An analytical method was established for the determination of 16 mycotoxins in traditional Chinese medicines (TCM) by isotope labeling-ultra performance liquid chromatography tandem mass spectrometry (UPLC-MS/MS), and 483 medicinal and edible ...
Fenghua LI   +7 more
doaj   +1 more source

A Review of IoT Firmware Vulnerabilities and Auditing Techniques

open access: yesSensors
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity.
Taimur Bakhshi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy