Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Capítulo de Livro
|
![]() |
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and FixesMassacci, Fabio ; Neuhaus, Stephan ; Nguyen, Viet Hung Wieringa, Roel ; Zannone, Nicola ; Erlingsson, ÚlfarEngineering Secure Software and Systems, p.195-208 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergSem texto completo |
2 |
Material Type: Capítulo de Livro
|
![]() |
AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention MechanismChen, Jinfu ; Liu, Bo ; Cai, Saihua ; Wang, Weijia ; Wang, Shengran Zhang, Wenhui ; Woodcock, Jim ; Qin, ShengchaoDependable Software Engineering. Theories, Tools, and Applications, p.161-177 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |
3 |
Material Type: Capítulo de Livro
|
![]() |
Analysis of Advanced Cyber Attacks with Quantified ESMIvanc, Blaž ; Klobučar, Tomaž Huang, Zhiqiu ; Wang, Jian ; Luo, Junzhou ; Sun, XingmingCloud Computing and Security, p.230-243 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
4 |
Material Type: Capítulo de Livro
|
![]() |
Analysis of Potential Code Vulnerabilities Involving Overlapping InstructionsAl Sardy, Loui ; Tang, Tong ; Spisländer, Marc ; Saglietti, Francesca Schoitsch, Erwin ; Bitsch, Friedemann ; Tonetta, StefanoComputer Safety, Reliability, and Security, p.103-113 [Periódico revisado por pares]Cham: Springer International PublishingSem texto completo |
5 |
Material Type: Capítulo de Livro
|
![]() |
Analysis of Cryptographic CVEs: Lessons Learned and PerspectivesKhoury, Raphaël ; Bolduc, Jérémy ; Lafrenière-Nickopoulos, Jason ; Odedele, Abdel-Gany Sèdes, Florence ; Tawbi, Nadia ; Ahmed, Toufik ; Mosbah, Mohamed ; Garcia-Alfaro, Joaquin ; Boulahia-Cuppens, NoraFoundations and Practice of Security, p.208-218 [Periódico revisado por pares]Cham: Springer Nature SwitzerlandSem texto completo |
6 |
Material Type: Capítulo de Livro
|
![]() |
Analysis on Structural Vulnerability Under the Asymmetric InformationHe, Mingshu ; Wang, Xiaojuan ; You, Jingwen ; Wang, Zhen Hu, Bo ; Zu, QiaohongHuman Centered Computing, 2018, Vol.10745, p.503-515 [Periódico revisado por pares]Switzerland: Springer International Publishing AGSem texto completo |
7 |
Material Type: Capítulo de Livro
|
![]() |
Analyzing String Buffers in CSimon, Axel ; King, Andy Ringeissen, Christophe ; Kirchner, HélèneAlgebraic Methodology and Software Technology, 2002, p.365-380 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
8 |
Material Type: Capítulo de Livro
|
![]() |
Architecture Modeling and Analysis of Security in Android SystemsSchmerl, Bradley ; Gennari, Jeff ; Sadeghi, Alireza ; Bagheri, Hamid ; Malek, Sam ; Cámara, Javier ; Garlan, David Tekinerdogan, Bedir ; Babar, Ali ; Zdun, UweSoftware Architecture, p.274-290 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
9 |
Material Type: Capítulo de Livro
|
![]() |
Are Third-Party Libraries Secure? A Software Library Checker for JavaViertel, Fabien Patrick ; Kortum, Fabian ; Wagner, Leif ; Schneider, Kurt Cuppens, Frédéric ; Zemmari, Akka ; Mosbah, Mohamed ; Cuppens-Boulahia, NoraRisks and Security of Internet and Systems, 2019, Vol.11391, p.18-34 [Periódico revisado por pares]Switzerland: Springer International Publishing AGSem texto completo |
10 |
Material Type: Capítulo de Livro
|
![]() |
Assessing Urban Rail Transit Systems Vulnerability: Metrics vs. Interdiction ModelsStarita, Stefano ; Esposito Amideo, Annunziata ; Scaparra, Maria Paola D'Agostino, Gregorio ; Scala, AntonioCritical Information Infrastructures Security, 2018, Vol.10707, p.144-155 [Periódico revisado por pares]Switzerland: Springer International Publishing AGSem texto completo |