Search

Your search keyword '"software security"' showing total 1,260 results

Search Constraints

Start Over You searched for: Descriptor "software security" Remove constraint Descriptor: "software security"
1,260 results on '"software security"'

Search Results

3. Accurate code fragment clone detection and its application in identifying known CVE clones.

4. Enhancing Security in Software Design Patterns and Antipatterns: A Framework for LLM-Based Detection.

5. A systematic literature review of security and privacy by design principles, norms, and strategies for digital technologies.

7. Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning.

8. Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering.

9. MultiTagging: A Vulnerable Smart Contract Labeling and Evaluation Framework.

10. A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography

11. SmartLLMSentry: A Comprehensive LLM Based Smart Contract Vulnerability Detection Framework

13. eGMT-Fuzz: Format-Aware Deep Fuzzing of Cryptographic Protocols

14. A SWOT Analysis of Software Development Life Cycle Security Metrics.

15. Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.

16. TACSan: Enhancing Vulnerability Detection with Graph Neural Network.

17. Multi-class vulnerability prediction using value flow and graph neural networks.

19. Algorithm for the functioning of the analysis and evaluation software package security of software of automated systems internal affairs bodies

20. NG_MDERANK: A software vulnerability feature knowledge extraction method based on N‐gram similarity.

21. Software Vulnerability Fuzz Testing: A Mutation-Selection Optimization Systematic Review.

22. Software Vulnerability Mining and Analysis Based on Deep Learning.

23. A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study.

24. Enhancing Software Code Vulnerability Detection Using GPT-4o and Claude-3.5 Sonnet: A Study on Prompt Engineering Techniques.

25. Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection.

26. RAMA: a risk assessment solution for healthcare organizations.

27. WolfFuzz: A Dynamic, Adaptive, and Directed Greybox Fuzzer.

28. A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems.

29. Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories.

30. Fuzzing Robotic Software Using HPC and LLM

32. Predicting Code Vulnerability Types via Heterogeneous GNN Learning

33. Towards Analysis of Threat Modeling of Software Systems According to Key Criteria

34. A Method Based on Behavior Driven Development (BDD) and System-Theoretic Process Analysis (STPA) for Verifying Security Requirements in Critical Software Systems

35. Web3 and Supply Chain Risks

37. Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations

38. Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis

40. An Empirical Study of the Imbalance Issue in Software Vulnerability Detection

41. Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection

42. Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction

43. Using software metrics for predicting vulnerable classes in java and python based systems.

44. A Survey of Binary Code Similarity Detection Techniques.

45. Data transmission channel protection organization in client-server software architecture.

46. Detecting SQL injection attacks by binary gray wolf optimizer and machine learning algorithms.

47. There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability Detection †.

48. Vulnerability analysis based on Software Bill of Materials (SBOM): A model proposal for automated vulnerability scanning for CI/CD pipelines.

49. FFRA: A Fine-Grained Function-Level Framework to Reduce the Attack Surface.

50. Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction.

Catalog

Books, media, physical & digital resources