-
1
-
2
-
3
On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code
Published 2020-06-01Subjects: Get full text
Article -
4
VulRep: vulnerability repair based on inducing commits and fixing commits
Published 2023-04-01Subjects: Get full text
Article -
5
SimpliFI: Hardware Simulation of Embedded Software Fault Attacks
Published 2021-06-01Subjects: Get full text
Article -
6
Mitigating Vulnerabilities in Closed Source Software
Published 2022-08-01Subjects: “…Software vulnerability…”
Get full text
Article -
7
Efficient Feature Selection for Static Analysis Vulnerability Prediction
Published 2021-02-01Subjects: “…software vulnerability prediction…”
Get full text
Article -
8
A Fuzzing Tool Based on Automated Grammar Detection
Published 2024-12-01Subjects: Get full text
Article -
9
DeepDiver: Diving into Abysmal Depth of the Binary for Hunting Deeply Hidden Software Vulnerabilities
Published 2020-04-01Subjects: “…software vulnerability…”
Get full text
Article -
10
A Comparative Analysis of Metaheuristic Feature Selection Methods in Software Vulnerability Prediction
Published 2024-11-01Subjects: “…software vulnerability prediction…”
Get full text
Article -
11
A Systematic Literature Review on Software Vulnerability Prediction Models
Published 2023-01-01Subjects: Get full text
Article -
12
Survey on static software vulnerability detection for source code
Published 2019-02-01Subjects: “…software vulnerability…”
Get full text
Article -
13
A new approach to deploy a self-adaptive distributed firewall
Published 2018-06-01Subjects: Get full text
Article -
14
The possibilities of implementing real-time programming code secured execution environments on GNU/LINUX operating systems
Published 2023-09-01Subjects: “…trusted execution environment, real-time, controlled execution, software vulnerability, cii.…”
Get full text
Article -
15
The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks
Published 2022-09-01Subjects: “…software vulnerability…”
Get full text
Article -
16
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01Subjects: “…software vulnerability…”
Get full text
Article -
17
Exploit detection based on illegal control flow transfers identification
Published 2014-09-01Subjects: “…software vulnerability;exploit;attack detection;address space layout randomization;data execution pro-tection…”
Get full text
Article -
18
The Effect of Dual Hyperparameter Optimization on Software Vulnerability Prediction Models
Published 2023-02-01Subjects: “…software vulnerability…”
Get full text
Article -
19
Marking Key Segment of Program Input via Attention Mechanism
Published 2019-01-01Subjects: Get full text
Article -
20
Assessment of Software Vulnerabilities using Best-Worst Method and Two-Way Analysis
Published 2020-04-01Subjects: “…software vulnerability…”
Get full text
Article