Results 241 to 250 of about 372,889 (280)
Some of the next articles are maybe not open access.

Improving Vulnerability Scanner Performance in Detecting AJAX Application Vulnerabilities

2019 International Conference on Data and Software Engineering (ICoDSE), 2019
The development of internet and web application gave birth to a new technology called AJAX. Web application utilizes this technology and create a new trend in web application – AJAX application. As a web application, there are some security issues related to AJAX application, one of which is the existence of web application vulnerabilities.
Kevin Jonathan Koswara   +1 more
openaire   +1 more source

Detecting security vulnerabilities with vulnerability nets

Journal of Systems and Software, 2022
Pingyan Wang   +3 more
openaire   +1 more source

Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers

2015 International Conference on Information Technology (ICIT), 2015
There has been a rampant surge in compromise of consumer grade small scale routers in the last couple of years. Attackers are able to manipulate the Domain Name Space (DNS) settings of these devices hence making them capable of initiating different man-in-the-middle attacks.
Prabaharan Poornachandran   +5 more
openaire   +1 more source

Reversing to detect software vulnerabilities

2017 12th Iberian Conference on Information Systems and Technologies (CISTI), 2017
Security is a real concern for the society and it is not different for software. Vulnerable applications can expose the users to multiple risks. Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteristics from the software.
Bruno Goncalves de Oliveira   +2 more
openaire   +1 more source

Semantic-Aware Vulnerability Detection

2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022
Zhen Huang, Marc White
openaire   +1 more source

Vulnerability Detection in Android

Android is a market-leading, open-source operating system. It is utilized not only in mobile phones, but also in smart TVs, smart TV boxes, and smart vehicles. Despite its substantial market share, it has significant security problems. For example, how to prevent attackers from taking control of the Android system, how to determine if spyware is ...
openaire   +1 more source

LLM-based Vulnerability Detection

2023 International Conference on Human-Centered Cognitive Systems (HCCS), 2023
Hongping Li, Li Shan
openaire   +1 more source

Detect Vulnerabilities Utilizing Fuzzing

Software security is critical to the industry as well as people’s daily life. In order to prevent security issues, a practical solution is to develop a system that can detect bugs before deployment. Nowadays, fuzzing is one of the most successful techniques for bug discovery, which have already found tens of thousands of bugs in real-world applications.
openaire   +1 more source

MVDetecter: Vulnerability Primitive-based General Memory Vulnerability Detection

2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2022
Xiaofan Nie   +5 more
openaire   +1 more source

Integrative oncology: Addressing the global challenges of cancer prevention and treatment

Ca-A Cancer Journal for Clinicians, 2022
Jun J Mao,, Msce   +2 more
exaly  

Home - About - Disclaimer - Privacy