Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
11 |
Material Type: Ata de Congresso
|
![]() |
ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android ApplicationsZhan, Xian ; Fan, Lingling ; Chen, Sen ; We, Feng ; Liu, Tianming ; Luo, Xiapu ; Liu, Yang2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021, p.1695-1707IEEETexto completo disponível |
12 |
Material Type: Ata de Congresso
|
![]() |
Vulnerability Categorization for Fast Multistep Attack ModellingLevshun, Dmitry ; Chechulin, Andrey2023 33rd Conference of Open Innovations Association (FRUCT), 2023, Vol.33 (1), p.169-175 [Periódico revisado por pares]FRUCTTexto completo disponível |
13 |
Material Type: Ata de Congresso
|
![]() |
Power grid vulnerability to geographically correlated failures - Analysis and control implicationsBernstein, Andrey ; Bienstock, Daniel ; Hay, David ; Uzunoglu, Meric ; Zussman, GilIEEE INFOCOM 2014 - IEEE Conference on Computer Communications, 2014, p.2634-2642IEEETexto completo disponível |
14 |
Material Type: Ata de Congresso
|
![]() |
VulSeeker: a semantic learning based vulnerability seeker for cross-platform binaryGao, Jian ; Yang, Xin ; Fu, Ying ; Jiang, Yu ; Sun, Jiaguang2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018, p.896-899New York, NY, USA: ACMTexto completo disponível |
15 |
Material Type: Ata de Congresso
|
![]() |
Vulnerability Detection in IoT Firmware: A SurveyXie, Wei ; Jiang, Yikun ; Tang, Yong ; Ding, Ning ; Gao, Yuanming2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS), 2017, p.769-772IEEETexto completo disponível |
16 |
Material Type: Ata de Congresso
|
![]() |
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code AuditsPerl, Henning ; Dechand, Sergej ; Smith, Matthew ; Arp, Daniel ; Yamaguchi, Fabian ; Rieck, Konrad ; Fahl, Sascha ; Acar, YaseminProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, p.426-437New York, NY, USA: ACMTexto completo disponível |
17 |
Material Type: Ata de Congresso
|
![]() |
On the impact of security vulnerabilities in the npm package dependency networkDecan, Alexandre ; Mens, Tom ; Constantinou, Eleni2018 IEEE/ACM 15th International Conference on Mining Software Repositories (MSR), 2018, p.181-191New York, NY, USA: ACMTexto completo disponível |
18 |
Material Type: Ata de Congresso
|
![]() |
Network vulnerability assessment using Bayesian networksLiu, Yu ; Man, HongProc. SPIE, 2005, Vol.5812, p.61-71Bellingham WA: SPIETexto completo disponível |
19 |
Material Type: Ata de Congresso
|
![]() |
A large scale exploratory analysis of software vulnerability life cyclesShahzad, M. ; Shafiq, M. Z. ; Liu, A. X.2012 34th International Conference on Software Engineering (ICSE), 2012, p.771-781IEEETexto completo disponível |
20 |
Material Type: Ata de Congresso
|
![]() |
Automated Vulnerability Detection in Source Code Using Deep Representation LearningRussell, Rebecca ; Kim, Louis ; Hamilton, Lei ; Lazovich, Tomo ; Harer, Jacob ; Ozdemir, Onur ; Ellingwood, Paul ; McConley, Marc2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), 2018, p.757-762IEEETexto completo disponível |