Results 31 to 40 of about 372,889 (280)

Vulpedia: Detecting vulnerable ethereum smart contracts via abstracted vulnerability signatures

open access: yesJournal of Systems and Software, 2022
Recent years have seen smart contracts are getting increasingly popular in building trustworthy decentralized applications. Previous research has proposed static and dynamic techniques to detect vulnerabilities in smart contracts. These tools check vulnerable contracts against several predefined rules.
Jiaming Ye   +5 more
openaire   +2 more sources

Intravascular Detection of the Vulnerable Plaque [PDF]

open access: yesCirculation: Cardiovascular Imaging, 2011
Coronary heart disease (CHD) remains the leading cause of death in the United States, and an estimated 1.4 million Americans have a heart attack each year. Over the past 2 decades, the concept of the “vulnerable plaque” (VP) being responsible for the majority of acute coronary syndromes (ACS) has become widely accepted.
William M, Suh   +4 more
openaire   +2 more sources

Ghera: A Repository of Android App Vulnerability Benchmarks

open access: yes, 2017
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven   +4 more
core   +1 more source

Tiresias: Predicting Security Events Through Deep Learning [PDF]

open access: yes, 2018
With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this
Blond Stevens Le   +11 more
core   +1 more source

An Empirical Study on Android-related Vulnerabilities

open access: yes, 2017
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket.
Bavota, Gabriele   +2 more
core   +1 more source

A machine learning approach with verification of predictions and assisted supervision for a rule-based network intrusion detection system [PDF]

open access: yes, 2008
Network security is a branch of network management in which network intrusion detection systems provide attack detection features by monitorization of traffic data.
Fernández Villamor, José Ignacio   +1 more
core   +1 more source

On Security and Sparsity of Linear Classifiers for Adversarial Settings

open access: yes, 2016
Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test ...
B Biggio   +11 more
core   +1 more source

Parent Quality of Life at Two Years Following Their Child's Completion of Acute Lymphoblastic Leukemia Treatment

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Parents of children treated for acute lymphoblastic leukemia (ALL) often experience significant caregiver burden and disruption to their well‐being. While parent quality of life (QoL) during treatment is well characterized, little is known about outcomes during early survivorship.
Sara Dal Pra   +3 more
wiley   +1 more source

Structural biology of ferritin nanocages

open access: yesFEBS Letters, EarlyView.
Ferritin is a conserved iron‐storage protein that sequesters iron as a ferric mineral core within a nanocage, protecting cells from oxidative damage and maintaining iron homeostasis. This review discusses ferritin biology, structure, and function, and highlights recent cryo‐EM studies revealing mechanisms of ferritinophagy, cellular iron uptake, and ...
Eloise Mastrangelo, Flavio Di Pisa
wiley   +1 more source

Towards Vulnerability Discovery Using Staged Program Analysis

open access: yes, 2016
Eliminating vulnerabilities from low-level code is vital for securing software. Static analysis is a promising approach for discovering vulnerabilities since it can provide developers early feedback on the code they write.
J Dean   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy