نتایج جستجو برای: vulnerability detection

تعداد نتایج: 606748  

Journal: :Scientific Programming 2022

A software construction detection algorithm based on improved CNN model is proposed. Firstly, extract the vulnerability characteristics of software, from static code by using program slicing technology, establish library, standardize language, and vectorize it as input data. Gru used to optimize neural network. The organic combination two can quickly process feature data retain calling relation...

Journal: :Communications in computer and information science 2023

One of the most important challenges in field software code audit is presence vulnerabilities source code. Every year, more and flaws are found, either internally proprietary or revealed publicly. These highly likely exploited lead to system compromise, data leakage, denial service. C C++ open-source codes now available order create a large-scale, classical machine-learning quantum for function...

Journal: :Atherosclerosis 2009
Laura Marcu Javier A Jo Qiyin Fang Thanassis Papaioannou Todd Reil Jian-Hua Qiao J Dennis Baker Julie A Freischlag Michael C Fishbein

OBJECTIVE Plaque with dense inflammatory cells, including macrophages, thin fibrous cap and superficial necrotic/lipid core is thought to be prone-to-rupture. We report a time-resolved laser-induced fluorescence spectroscopy (TR-LIFS) technique for detection of such markers of plaque vulnerability in human plaques. METHODS The autofluorescence of carotid plaques (65 endarterectomy patients) i...

2010
Adam Doupé Marco Cova Giovanni Vigna

Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as “point-and-click pentesting” tools that automatically evaluate the security of web applications with little or no human support. These tools access a web application in the same way users do, and, therefore, have the advantage of being ind...

2003
Constantine Daicos Scott Knight

It has been understood for some time that arbitrary data, including the communications associated with malicious backdoors and Trojan horses, can be tunnelled by subverting the HTTP protocol. Although there are a number of demonstration programs openly available, the risks associated with this vulnerability have not been characterised in the literature. This research investigates the nature of ...

2011
Avinash Srinivasan Jie Wu

Data hiding has been an integral part of human society from the very early days dating back to BC. It has played its role for both good and bad purposes. First instances of data hiding dates back to 440 B.C. and has been cited in several works as one of the first known and recorded use of steganography. Several complicated Steganographic techniques have been proposed in the past decade to decei...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید