نتایج جستجو برای: vulnerability detection
تعداد نتایج: 606748 فیلتر نتایج به سال:
Building secure software is challenging, time-consuming, and expensive. Software vulnerability prediction models that identify vulnerable software components are usually used to focus security efforts, with the aim of helping to reduce the time and effort needed to secure software. Existing vulnerability prediction models use process or product metrics and machine learning techniques to identif...
The existence of software vulnerabilities will cause serious network attacks and information leakage problems. Timely accurate detection in has become a research focus on the security field. Most existing work only considers instruction-level features, which to some extent overlooks certain syntax semantic assembly code segments, affecting accuracy model. In this paper, we propose binary vulner...
A smart contract, as an important part of blockchain technology, has attracted considerable interest from both industry and academia. It provides the basis for realization a variety practical applications plays crucial role in ecosystem. While it also holds large number digital assets, frequent occurrence contract vulnerabilities have caused huge economic losses destroyed blockchain-based credi...
Web applications are widely used, and new ways for easier cost-effective methods to develop them constantly introduced. A common omission among the development implementation techniques when designing is security; Node.js no exception, as Server-Side JavaScript Injection (SSJI) attacks possible due use of vulnerable functions neglecting sanitize data input provided by untrusted sources. This sp...
The number of attacks is increasing day by day, especially the web attacks due to the shift of the majority of companies towards web applications. Therefore, the security of their sensitive data against attackers becomes a crucial matter for all organization and companies. Thus the necessity to use intrusion detection systems are required in order to increases the protection and prevent attacke...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید