Results 21 to 30 of about 5,764,266 (332)

An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning

open access: yesEntropy, 2022
Much research on adversarial attacks has proved that deep neural networks have certain security vulnerabilities. Among potential attacks, black-box adversarial attacks are considered the most realistic based on the the natural hidden nature of deep ...
Zhiyu Chen   +7 more
doaj   +1 more source

Infiltrating security into development: exploring the world’s largest software security study

open access: yesESEC/SIGSOFT FSE, 2021
Recent years have seen rapid increases in cybercrime. The use of effective software security activities plays an important part in preventing the harm involved.
Charles Weir   +3 more
semanticscholar   +1 more source

A hierarchical model for quantifying software security based on static analysis alerts and software metrics

open access: yesSoftware quality journal, 2021
Despite the acknowledged importance of quantitative security assessment in secure software development, current literature still lacks an efficient model for measuring internal software security risk.
Miltiadis G. Siavvas   +3 more
semanticscholar   +1 more source

Measurements of the Most Significant Software Security Weaknesses [PDF]

open access: yesAsia-Pacific Computer Systems Architecture Conference, 2020
In this work, we provide a metric to calculate the most significant software security weaknesses as defined by an aggregate metric of the frequency, exploitability, and impact of related vulnerabilities.
C. Galhardo   +3 more
semanticscholar   +1 more source

A UML-based static verification framework for security [PDF]

open access: yes, 2010
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates that security characteristics should be considered from the early stages ...
Siveroni, I.   +2 more
core   +1 more source

A Type of Energy-Balanced Tree Based Data Collection Strategy for Sensor Network With Mobile Sink

open access: yesIEEE Access, 2019
In order to improve the sensing efficiency of the sensor network, a type of energy-balanced tree-based data collection strategy with mobile Sink (ETDC) is proposed.
Chao Sha   +4 more
doaj   +1 more source

A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN

open access: yesIEEE Access, 2019
Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently.
Jin Yang   +4 more
doaj   +1 more source

Software Architecture of Code Analysis Frameworks Matters: The Frama-C Example [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2015
Implementing large software, as software analyzers which aim to be used in industrial settings, requires a well-engineered software architecture in order to ease its daily development and its maintenance process during its lifecycle.
Julien Signoles
doaj   +1 more source

Process of designing robust, dependable, safe and secure software for medical devices: Point of care testing device as a case study [PDF]

open access: yes, 2013
This article has been made available through the Brunel Open Access Publishing Fund.Copyright © 2013 Sivanesan Tulasidas et al. This paper presents a holistic methodology for the design of medical device software, which encompasses of a new way of ...
Balachandran, W   +5 more
core   +3 more sources

From cyber-security deception to manipulation and gratification through gamification [PDF]

open access: yes, 2019
Over the last two decades the field of cyber-security has experienced numerous changes associated with the evolution of other fields, such as networking, mobile communications, and recently the Internet of Things (IoT) [3].
DM Buss   +8 more
core   +4 more sources

Home - About - Disclaimer - Privacy