Search

Your search keyword '"COMPUTER software security"' showing total 1,216 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER software security" Remove constraint Descriptor: "COMPUTER software security"
1,216 results on '"COMPUTER software security"'

Search Results

1. Vulnerability detection based on transformer and high‐quality number embedding.

2. Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering.

3. Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection.

4. A SWOT Analysis of Software Development Life Cycle Security Metrics.

5. A Secure Auditable Remote Registry Pattern for IoT Systems.

6. StackGuard+$\text{StackGuard}^+$: Interoperable alternative to canary‐based protection of stack smashing.

7. Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.

8. TACSan: Enhancing Vulnerability Detection with Graph Neural Network.

9. The Security Jawbreaker.

10. ROBOFORM: QUIET AND EFFICIENT PASSWORD MANAGER THAT GETS THE JOB DONE.

11. Automotive Cybersecurity: A Survey on Frameworks, Standards, and Testing and Monitoring Technologies.

12. Multi-class vulnerability prediction using value flow and graph neural networks.

13. NG_MDERANK: A software vulnerability feature knowledge extraction method based on N‐gram similarity.

14. Survey on identification and prediction of security threats using various deep learning models on software testing.

15. A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study.

16. Enhancing Software Code Vulnerability Detection Using GPT-4o and Claude-3.5 Sonnet: A Study on Prompt Engineering Techniques.

17. Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection.

18. A hardware-based multi-factor authentication - An initiative to secure web applications.

19. Computers, Laptop.

20. Towards a security‐optimized approach for the microservice‐oriented decomposition.

21. WolfFuzz: A Dynamic, Adaptive, and Directed Greybox Fuzzer.

22. GRASE: Granulometry Analysis With Semi Eager Classifier to Detect Malware.

23. RepFTI: Representation-Fused Function-Type Inference for Vehicular Secure Software Systems.

24. Assessment of Software Vulnerability Contributing Factors by Model-Agnostic Explainable AI.

25. A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems.

26. HotCFuzz: Enhancing Vulnerability Detection through Fuzzing and Hotspot Code Coverage Analysis.

27. Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs.

28. Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis.

29. Maturity model for secure software testing.

30. A Survey of Binary Code Similarity Detection Techniques.

31. Vulnerability analysis based on Software Bill of Materials (SBOM): A model proposal for automated vulnerability scanning for CI/CD pipelines.

32. A systematic review of fuzzing.

33. A Novel Seed Generation Approach for Vulnerability Mining Based on Generative Adversarial Networks and Attention Mechanisms.

34. Security risks of global software development life cycle: Industry practitioner's perspective.

35. Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis.

36. Vision Transformer Inspired Automated Vulnerability Repair.

37. Compositional Verification of First-Order Masking Countermeasures against Power Side-Channel Attacks.

38. Mitigating Software Vulnerabilities through Secure Software Development with a Policy-Driven Waterfall Model.

39. Software Development Teams Knowledge and Awareness of Security Requirement Engineering and Security Requirement Elicitation and Analysis.

40. A Survey of Software Dynamic Analysis Methods.

41. Estimating vulnerability metrics with word embedding and multiclass classification methods.

42. BiT5: A Bidirectional NLP Approach for Advanced Vulnerability Detection in Codebase.

43. Binary Program Vulnerability Mining Based on Neural Network.

44. Learning to Detect Memory-related Vulnerabilities.

45. A Business-Oriented Methodology to Evaluate the Security of Software Architecture Quantitatively.

46. Vulnerability Scanning by CPE-CVE Matching.

47. CODEGUARD: UTILIZING ADVANCED PATTERN RECOGNITION IN LANGUAGE MODELS FOR SOFTWARE VULNERABILITY ANALYSIS.

48. A Comparative Study of Commit Representations for JIT Vulnerability Prediction.

49. ICVTest: A Practical Black-Box Penetration Testing Framework for Evaluating Cybersecurity of Intelligent Connected Vehicles.

50. Fuzzing: Progress, Challenges, and Perspectives.

Catalog

Books, media, physical & digital resources