Face Detection Performance Using CNNs and Bug Bonuty Program (BBP)
Bug bounty schemes make use of outside ethical hackers to find and fix a variety of security flaws, guaranteeing quicker and more affordable problem solving. Better confidence in and image of the company in the cybersecurity space, faster solving issues, and increased community collaboration are so...
Main Authors: | Yasmin Makki Mohialden, Saba Salman, Nadia Mahmood Hussien |
---|---|
Format: | Article |
Language: | English |
Published: |
College of Education, Al-Iraqia University
2024-03-01
|
Series: | Iraqi Journal for Computer Science and Mathematics |
Subjects: | |
Online Access: | https://journal.esj.edu.iq/index.php/IJCM/article/view/1616 |
Similar Items
-
Navigating vulnerability markets and bug bounty programs: A public policy perspective
by: Aviram Zrahia
Published: (2024-02-01) -
Bountychain: Toward Decentralizing a Bug Bounty Program with Blockchain and IPFS
by: Alex Hoffman, et al.
Published: (2021-06-01) -
Spotting Deepfakes and Face Manipulations by Fusing Features from Multi-Stream CNNs Models
by: Semih Yavuzkilic, et al.
Published: (2021-07-01) -
APPLICATION OF EXPLAINABLE ARTIFICIAL INTELLIGENCE IN SOFTWARE BUG CLASSIFICATION
by: Łukasz Chmielowski, et al.
Published: (2023-03-01) -
Using textual bug reports to predict the fault category of software bugs
by: Thomas Hirsch, et al.
Published: (2022-09-01)