Results 31 to 40 of about 372,889 (280)
Vulpedia: Detecting vulnerable ethereum smart contracts via abstracted vulnerability signatures
Recent years have seen smart contracts are getting increasingly popular in building trustworthy decentralized applications. Previous research has proposed static and dynamic techniques to detect vulnerabilities in smart contracts. These tools check vulnerable contracts against several predefined rules.
Jiaming Ye +5 more
openaire +2 more sources
Intravascular Detection of the Vulnerable Plaque [PDF]
Coronary heart disease (CHD) remains the leading cause of death in the United States, and an estimated 1.4 million Americans have a heart attack each year. Over the past 2 decades, the concept of the “vulnerable plaque” (VP) being responsible for the majority of acute coronary syndromes (ACS) has become widely accepted.
William M, Suh +4 more
openaire +2 more sources
Ghera: A Repository of Android App Vulnerability Benchmarks
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven +4 more
core +1 more source
Tiresias: Predicting Security Events Through Deep Learning [PDF]
With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this
Blond Stevens Le +11 more
core +1 more source
An Empirical Study on Android-related Vulnerabilities
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket.
Bavota, Gabriele +2 more
core +1 more source
A machine learning approach with verification of predictions and assisted supervision for a rule-based network intrusion detection system [PDF]
Network security is a branch of network management in which network intrusion detection systems provide attack detection features by monitorization of traffic data.
Fernández Villamor, José Ignacio +1 more
core +1 more source
On Security and Sparsity of Linear Classifiers for Adversarial Settings
Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test ...
B Biggio +11 more
core +1 more source
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra +3 more
wiley +1 more source
Structural biology of ferritin nanocages
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley +1 more source
Towards Vulnerability Discovery Using Staged Program Analysis
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write.
J Dean +6 more
core +1 more source

