Search

Your search keyword '"software security"' showing total 533 results

Search Constraints

Start Over You searched for: Descriptor "software security" Remove constraint Descriptor: "software security" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
533 results on '"software security"'

Search Results

3. Accurate code fragment clone detection and its application in identifying known CVE clones.

4. Enhancing Security in Software Design Patterns and Antipatterns: A Framework for LLM-Based Detection.

5. A systematic literature review of security and privacy by design principles, norms, and strategies for digital technologies.

7. Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning.

8. Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering.

9. MultiTagging: A Vulnerable Smart Contract Labeling and Evaluation Framework.

10. A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography

11. SmartLLMSentry: A Comprehensive LLM Based Smart Contract Vulnerability Detection Framework

13. eGMT-Fuzz: Format-Aware Deep Fuzzing of Cryptographic Protocols

14. A SWOT Analysis of Software Development Life Cycle Security Metrics.

15. Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.

16. TACSan: Enhancing Vulnerability Detection with Graph Neural Network.

17. Multi-class vulnerability prediction using value flow and graph neural networks.

19. Algorithm for the functioning of the analysis and evaluation software package security of software of automated systems internal affairs bodies

20. NG_MDERANK: A software vulnerability feature knowledge extraction method based on N‐gram similarity.

21. Software Vulnerability Fuzz Testing: A Mutation-Selection Optimization Systematic Review.

22. Software Vulnerability Mining and Analysis Based on Deep Learning.

23. A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study.

24. Enhancing Software Code Vulnerability Detection Using GPT-4o and Claude-3.5 Sonnet: A Study on Prompt Engineering Techniques.

25. Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection.

26. RAMA: a risk assessment solution for healthcare organizations.

27. WolfFuzz: A Dynamic, Adaptive, and Directed Greybox Fuzzer.

28. A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems.

29. Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories.

30. Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction

31. A Survey of Binary Code Similarity Detection Techniques.

32. Data transmission channel protection organization in client-server software architecture.

33. Detecting SQL injection attacks by binary gray wolf optimizer and machine learning algorithms.

34. There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability Detection †.

35. Vulnerability analysis based on Software Bill of Materials (SBOM): A model proposal for automated vulnerability scanning for CI/CD pipelines.

36. FFRA: A Fine-Grained Function-Level Framework to Reduce the Attack Surface.

37. Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.

38. Security risks of global software development life cycle: Industry practitioner's perspective.

39. Vision Transformer Inspired Automated Vulnerability Repair.

40. MACHINE LEARNING FOR SOFTWARE SECURITY TESTING.

41. Delegation-Based Agile Secure Software Development Approach for Small and Medium-Sized Businesses

42. Automated Intel SGX Integration for Enhanced Application Security

43. On the Code Vulnerability Detection Based on Deep Learning: A Comparative Study

45. Estimating vulnerability metrics with word embedding and multiclass classification methods.

46. BiT5: A Bidirectional NLP Approach for Advanced Vulnerability Detection in Codebase.

47. Shadow IT in higher education: survey and case study for cybersecurity.

48. CODESENTRY: REVOLUTIONIZING REAL-TIME SOFTWARE VULNERABILITY DETECTION WITH OPTIMIZED GPT FRAMEWORK.

49. Security vulnerabilities in healthcare: an analysis of medical devices and software.

50. Fuzzing: Progress, Challenges, and Perspectives.

Catalog

Books, media, physical & digital resources