An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning
Much research on adversarial attacks has proved that deep neural networks have certain security vulnerabilities. Among potential attacks, black-box adversarial attacks are considered the most realistic based on the the natural hidden nature of deep ...
Zhiyu Chen +7 more
doaj +1 more source
Infiltrating security into development: exploring the world’s largest software security study
Recent years have seen rapid increases in cybercrime. The use of effective software security activities plays an important part in preventing the harm involved.
Charles Weir +3 more
semanticscholar +1 more source
Despite the acknowledged importance of quantitative security assessment in secure software development, current literature still lacks an efficient model for measuring internal software security risk.
Miltiadis G. Siavvas +3 more
semanticscholar +1 more source
Measurements of the Most Significant Software Security Weaknesses [PDF]
In this work, we provide a metric to calculate the most significant software security weaknesses as defined by an aggregate metric of the frequency, exploitability, and impact of related vulnerabilities.
C. Galhardo +3 more
semanticscholar +1 more source
A UML-based static verification framework for security [PDF]
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates that security characteristics should be considered from the early stages ...
Siveroni, I. +2 more
core +1 more source
A Type of Energy-Balanced Tree Based Data Collection Strategy for Sensor Network With Mobile Sink
In order to improve the sensing efficiency of the sensor network, a type of energy-balanced tree-based data collection strategy with mobile Sink (ETDC) is proposed.
Chao Sha +4 more
doaj +1 more source
A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN
Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently.
Jin Yang +4 more
doaj +1 more source
Software Architecture of Code Analysis Frameworks Matters: The Frama-C Example [PDF]
Implementing large software, as software analyzers which aim to be used in industrial settings, requires a well-engineered software architecture in order to ease its daily development and its maintenance process during its lifecycle.
Julien Signoles
doaj +1 more source
Process of designing robust, dependable, safe and secure software for medical devices: Point of care testing device as a case study [PDF]
This article has been made available through the Brunel Open Access Publishing Fund.Copyright © 2013 Sivanesan Tulasidas et al. This paper presents a holistic methodology for the design of medical device software, which encompasses of a new way of ...
Balachandran, W +5 more
core +3 more sources
From cyber-security deception to manipulation and gratification through gamification [PDF]
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss +8 more
core +4 more sources

