نتایج جستجو برای: vulnerability detection

تعداد نتایج: 606748  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1393

due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...

Journal: :International Journal of Engineering & Technology 2018

Journal: :IEEE Transactions on Dependable and Secure Computing 2019

Journal: :DEStech Transactions on Computer Science and Engineering 2018

Journal: :Journal of Systems and Software 2022

Software vulnerabilities are weaknesses in source code that might be exploited to cause harm or loss. Previous work has proposed a number of automated machine learning approaches detect them. Most these techniques at release-level, meaning they aim predicting the files will potentially vulnerable future release. Yet, researchers have shown commit-level identification issues better fit developer...

Journal: :Journal of cyber security 2022

At present, the network security situation is becoming more and serious. Malicious attacks such as computer viruses, Trojans hacker are rampant. National group information war terrorism have a serious damage to production life of whole society. same time, with rapid development Internet Things arrival 5G era, IoT devices an important part industrial system, become target infiltration by hostile...

2004
Roland H. C. Yap

The number of security vulnerabilities discovered in computer systems has increased explosively. Currently, in order to keep track of security alerts, system administrators rely on vulnerability databases such as: CERT Coordination Centre, Securityfocus BugTraq and Sans Vulnerabilities Notes Database. Such databases are designed primarily to be read and understood by humans. Given the speed at ...

Journal: :journal of ai and data mining 2013
meysam alikhani mohammad ahmadi livani

mobile ad-hoc networks (manets) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. in this paper, two methods proposed for dynamic anom...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید