Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A New Vulnerability Reporting Framework for Software Vulnerability Databases
Kekül, Hakan, Ergen, Burhan, Arslan, Halil
Published in International Journal of Education and Management Engineering (08.06.2021)
Published in International Journal of Education and Management Engineering (08.06.2021)
Get full text
Journal Article
Cybersecurity: a predictive analytical model for software vulnerability discovery process
Pokhrel, Nawa Raj, Khanal, Netra, Tsokos, Chris P., Pokhrel, Keshav
Published in Journal of cyber security (02.01.2021)
Published in Journal of cyber security (02.01.2021)
Get full text
Journal Article
On the usage of JavaScript, Python and Ruby packages in Docker Hub images
Zerouali, Ahmed, Mens, Tom, De Roover, Coen
Published in Science of computer programming (01.07.2021)
Published in Science of computer programming (01.07.2021)
Get full text
Journal Article
Use of SecureED as a Tool for Software Security Education: An Experience Report
Get full text
Conference Proceeding
DCW-RNN: Improving Class Level Metrics for Software Vulnerability Detection Using Artificial Immune System with Clock-Work Recurrent Neural Network
Sahin, Canan Batur
Published in 2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) (25.08.2021)
Published in 2021 International Conference on INnovations in Intelligent SysTems and Applications (INISTA) (25.08.2021)
Get full text
Conference Proceeding
Predicting Software Vulnerability Using Security Discussion in Social Media
Queiroz, Andrei, Keegan, Brian, Mtenzi, Fredrick
Published in European Conference on Cyber Warfare and Security (01.06.2017)
Get full text
Published in European Conference on Cyber Warfare and Security (01.06.2017)
Conference Proceeding
Existing Vulnerability Information in Security Requirements Elicitation
Amin, Md Rayhan, Bhowmik, Tanmay
Published in IEEE International Requirements Engineering Conference Workshops (Online) (01.08.2022)
Published in IEEE International Requirements Engineering Conference Workshops (Online) (01.08.2022)
Get full text
Conference Proceeding
A Cross-Platform Multifunctional Testbed for Vulnerability Attack
Yin Xinchun, Shen Xiaobin, Yuan Fuchao, Mao Bing, Xie Li
Published in Proceedings : 2009 International Forum on Computer Science-Technology and Applications ; IFCSTA 2009 ; 25-27 December 2009, Chongqing, China / [edited by Zhou Qihai ; sponsored by IITAA (01.12.2009)
Published in Proceedings : 2009 International Forum on Computer Science-Technology and Applications ; IFCSTA 2009 ; 25-27 December 2009, Chongqing, China / [edited by Zhou Qihai ; sponsored by IITAA (01.12.2009)
Get full text
Conference Proceeding
Analyzing the Impact of Cyber Security Related Attributes for Intrusion Detection Systems
Alharbi, Abdullah, Seh, Adil Hussain, Alosaimi, Wael, Alyami, Hashem, Agrawal, Alka, Kumar, Rajeev, Khan, Raees Ahmad
Published in Sustainability (09.11.2021)
Published in Sustainability (09.11.2021)
Get full text
Journal Article
Application of knowledge graph in software engineering field: A systematic literature review
Wang, Lu, Sun, Chenhan, Zhang, Chongyang, Nie, Weikun, Huang, Kaiyuan
Published in Information and software technology (01.12.2023)
Published in Information and software technology (01.12.2023)
Get full text
Journal Article
NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY
CHOI, JAY PIL, FERSHTMAN, CHAIM, GANDAL, NEIL
Published in The Journal of industrial economics (01.12.2010)
Published in The Journal of industrial economics (01.12.2010)
Get full text
Journal Article
Human Subject Evaluation of Computer-Security Training Recommender
Nadeem, Muhammad, Williams, Byron J., Bradshaw, Gary L., Allen, Edward B.
Published in Proceedings - International Computer Software & Applications Conference (01.06.2016)
Published in Proceedings - International Computer Software & Applications Conference (01.06.2016)
Get full text
Conference Proceeding
Journal Article
Detecting software vulnerabilities in an isolated computing environment
Year of Publication 28.04.2015
Get full text
Patent