Search

Your search keyword '"COMPUTER software security"' showing total 520 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER software security" Remove constraint Descriptor: "COMPUTER software security" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
520 results on '"COMPUTER software security"'

Search Results

1. Review of Techniques for Integrating Security in Software Development Lifecycle.

2. Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing.

3. Vulnerability detection based on transformer and high‐quality number embedding.

4. Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering.

5. Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection.

6. The Impact of Competition Intensity on Software Security: An Empirical Analysis of Web Browser Patch Releases.

7. Slicing Through the Noise: Efficient Crash Deduplication via Trace Reconstruction and Fuzzy Hashing.

8. MultiTagging: A Vulnerable Smart Contract Labeling and Evaluation Framework.

9. A Fuzzing Tool Based on Automated Grammar Detection.

10. A SWOT Analysis of Software Development Life Cycle Security Metrics.

11. DSHGT: Dual-Supervisors Heterogeneous Graph Transformer—A Pioneer Study of Using Heterogeneous Graph Learning for Detecting Software Vulnerabilities.

12. Classifying software security requirements into confidentiality, integrity, and availability using machine learning approaches.

13. A Secure Auditable Remote Registry Pattern for IoT Systems.

14. Using Artificial Intelligence and SDN for Dynamic Scalable Control of Security Rules: An IoT Security Solution.

15. Towards a security‐optimized approach for the microservice‐oriented decomposition.

16. StackGuard+$\text{StackGuard}^+$: Interoperable alternative to canary‐based protection of stack smashing.

17. Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.

18. TACSan: Enhancing Vulnerability Detection with Graph Neural Network.

19. Automotive Cybersecurity: A Survey on Frameworks, Standards, and Testing and Monitoring Technologies.

20. Multi-class vulnerability prediction using value flow and graph neural networks.

21. NG_MDERANK: A software vulnerability feature knowledge extraction method based on N‐gram similarity.

22. Survey on identification and prediction of security threats using various deep learning models on software testing.

23. A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study.

24. Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection.

25. Enhancing Software Code Vulnerability Detection Using GPT-4o and Claude-3.5 Sonnet: A Study on Prompt Engineering Techniques.

26. A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems.

27. Assessment of Software Vulnerability Contributing Factors by Model-Agnostic Explainable AI.

28. RepFTI: Representation-Fused Function-Type Inference for Vehicular Secure Software Systems.

29. WolfFuzz: A Dynamic, Adaptive, and Directed Greybox Fuzzer.

30. GRASE: Granulometry Analysis With Semi Eager Classifier to Detect Malware.

31. HotCFuzz: Enhancing Vulnerability Detection through Fuzzing and Hotspot Code Coverage Analysis.

32. Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs.

33. Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis.

34. Maturity model for secure software testing.

35. A Survey of Binary Code Similarity Detection Techniques.

36. SOFTWARE INFORMATION SECURITY MANAGEMENT FOR GOVERNMENT AUTHORITIES.

37. Vulnerability analysis based on Software Bill of Materials (SBOM): A model proposal for automated vulnerability scanning for CI/CD pipelines.

38. A systematic review of fuzzing.

39. A Novel Seed Generation Approach for Vulnerability Mining Based on Generative Adversarial Networks and Attention Mechanisms.

40. Security risks of global software development life cycle: Industry practitioner's perspective.

41. Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis.

42. Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks.

43. Vision Transformer Inspired Automated Vulnerability Repair.

44. Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model.

45. Software Development Teams Knowledge and Awareness of Security Requirement Engineering and Security Requirement Elicitation and Analysis.

46. A Survey of Software Dynamic Analysis Methods.

47. Estimating vulnerability metrics with word embedding and multiclass classification methods.

48. BiT5: A Bidirectional NLP Approach for Advanced Vulnerability Detection in Codebase.

49. Binary Program Vulnerability Mining Based on Neural Network.

50. Learning to Detect Memory-related Vulnerabilities.

Catalog

Books, media, physical & digital resources