Results 11 to 20 of about 158,430 (308)
An Intelligent Fuzzing Data Generation Method Based on Deep Adversarial Learning
Fuzzing (Fuzz testing) can effectively identify security vulnerabilities in software by providing a large amount of unexpected input to the target program. An important part of fuzzing test is the fuzzing data generation.
Zhihui Li +4 more
doaj +1 more source
Review on Testing of Cyber Physical Systems: Methods and Testbeds
Cyber physical systems (CPSs) are rapidly developing, with increasing scale, complexity and heterogeneity. However, testing CPSs systematically to ensure that they operate with high reliability remains a big challenge.
Xin Zhou +3 more
doaj +1 more source
Security Aspect in Software Testing Perspective: A Systematic Literature Review
Background: Software testing and software security have become one of the most important parts of an application. Many studies have explored each of these topics but there is a gap wherein the relation of software security and software testing in general
Halim Wildan Awalurahman +3 more
doaj +1 more source
Two-Stage Optimal Hypotheses Testing for a Model of Stegosystem with an Active Adversary [PDF]
We study the information-theoretic model of stegosystem with an active adversary, where unlike a passive adversary he can not only read but also write. The legitimate sender as well as the adversary can embed or not a message in the sending data.
Mariam Haroutunian +2 more
doaj +3 more sources
Extending MUD Profiles Through an Automated IoT Security Testing Methodology
Defining the intended behaviour of IoT devices is considered as a key aspect to detect and mitigate potential security attacks. In this direction, the Manufacturer Usage Description (MUD) has been recently standardised to reduce the attack surface of a ...
Sara Nieves Matheu +3 more
doaj +1 more source
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for.
Francesc Mateo Tudela +4 more
doaj +1 more source
Survey of Model-Based Security Testing Approaches in the Automotive Domain
Modern connected or autonomous vehicles (AVs) are highly complex cyber-physical systems. As a result of the high number of different technologies and connectivity features involved, testing these systems to identify security vulnerabilities is a big ...
Florian Sommer +2 more
doaj +1 more source
Intelligent building construction site safety inspection model based on YOLOX [PDF]
The construction industry is a high-risk and high accident rate industry, and it is crucial to conduct safety inspections on construction sites. Therefore, the study introduces an improved YOLOX algorithm and performs lightweight processing such as ...
Hairong Huang +3 more
doaj +1 more source
Determination and Analysis of 16 Mycotoxins in Medicinal and Edible Traditional Chinese Medicine
Objective: An analytical method was established for the determination of 16 mycotoxins in traditional Chinese medicines (TCM) by isotope labeling-ultra performance liquid chromatography tandem mass spectrometry (UPLC-MS/MS), and 483 medicinal and edible ...
Fenghua LI +7 more
doaj +1 more source
A Review of IoT Firmware Vulnerabilities and Auditing Techniques
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity.
Taimur Bakhshi +2 more
doaj +1 more source

