Results 11 to 20 of about 1,438,104 (293)

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection [PDF]

open access: yesInternational Symposium on Recent Advances in Intrusion Detection, 2023
We propose and release a new vulnerable source code dataset. We curate the dataset by crawling security issue websites, extracting vulnerability-fixing commits and source codes from the corresponding projects.
Yizheng Chen   +4 more
semanticscholar   +1 more source

Data Quality for Software Vulnerability Datasets [PDF]

open access: yesInternational Conference on Software Engineering, 2023
The use of learning-based techniques to achieve automated software vulnerability detection has been of longstanding interest within the software security domain.
Roland Croft   +2 more
semanticscholar   +1 more source

Climate Change 2022 – Impacts, Adaptation and Vulnerability

open access: yes, 2023
The Working Group II contribution to the Sixth Assessment Report of the Intergovernmental Panel on Climate Change (IPCC) provides a comprehensive assessment of the scientific literature relevant to climate change impacts, adaptation and vulnerability ...
Dr. Kirstin K. Holsman
semanticscholar   +1 more source

Deep Learning Based Vulnerability Detection: Are We There Yet? [PDF]

open access: yesIEEE Transactions on Software Engineering, 2020
Automated detection of software vulnerabilities is a fundamental problem in software security. Existing program analysis techniques either suffer from high false positives or false negatives.
Saikat Chakraborty   +3 more
semanticscholar   +1 more source

Vulnerability detection with fine-grained interpretations [PDF]

open access: yesESEC/SIGSOFT FSE, 2021
Despite the successes of machine learning (ML) and deep learning (DL)-based vulnerability detectors (VD), they are limited to providing only the decision on whether a given code is vulnerable or not, without details on what part of the code is relevant ...
Yi Li, Shaohua Wang, T. Nguyen
semanticscholar   +1 more source

LineVul: A Transformer-based Line-Level Vulnerability Prediction

open access: yesIEEE Working Conference on Mining Software Repositories, 2022
Software vulnerabilities are prevalent in software systems, causing a variety of problems including deadlock, information loss, or system failures. Thus, early predictions of software vulnerabilities are critically important in safety-critical software ...
Michael Fu, C. Tantithamthavorn
semanticscholar   +1 more source

LineVD: Statement-level Vulnerability Detection using Graph Neural Networks [PDF]

open access: yesIEEE Working Conference on Mining Software Repositories, 2022
Current machine-learning based software vulnerability detection methods are primarily conducted at the function-level. However, a key limitation of these methods is that they do not indicate the specific lines of code contributing to vulnerabilities ...
David Hin   +3 more
semanticscholar   +1 more source

Adaptation interventions and their effect on vulnerability in developing countries: Help, hindrance or irrelevance?

open access: yesWorld Development, 2021
This paper critically reviews the outcomes of internationally-funded interventions aimed at climate change adaptation and vulnerability reduction.
S. Eriksen   +19 more
semanticscholar   +1 more source

Preparedness and vulnerability of African countries against importations of COVID-19: a modelling study

open access: yesThe Lancet, 2020
Background The novel coronavirus disease 2019 (COVID-19) epidemic has spread from China to 25 countries. Local cycles of transmission have already occurred in 12 countries after case importation. In Africa, Egypt has so far confirmed one case.
M. Gilbert   +12 more
semanticscholar   +1 more source

Mandatory containment of COVID-19 patients in Monastir: Legislative framework and impact on freedoms

open access: yesEuropean Psychiatry, 2022
Introduction Tunisia found itself in an exceptional situation during the covid 19 pandemic requiring a legal regime of exceptionality and sanitary necessity with a double challenge: the fight against the sanitary crisis, and the preservation of ...
I. Betbout   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy