Loading…
Vulnerability Analysis of Similar Code
Piran, Azin, Chang, Che-Pin, Fard, Amin Milani
Published in IEEE International Conference on Software Quality, Reliability and Security (Online) (01.12.2021)
Published in IEEE International Conference on Software Quality, Reliability and Security (Online) (01.12.2021)
Get full text
Conference Proceeding
Loading…
Predicting common web application vulnerabilities from input validation and sanitization code patterns
Shar, Lwin Khin, Tan, Hee Beng Kuan
Published in 27th IEEE/ACM International Conference on Automated Software Engineering (ASE) : proceedings, September 3-7, 2012, Essen, Germany (03.09.2012)
Published in 27th IEEE/ACM International Conference on Automated Software Engineering (ASE) : proceedings, September 3-7, 2012, Essen, Germany (03.09.2012)
Get full text
Conference Proceeding
Loading…
The importance of testing Smart Grid IEDs against security vulnerabilities
Weerathunga, Pubudu Eroshan, Cioraca, Anca
Published in Annual Conference for Protective Relay Engineers : [proceedings] (01.04.2016)
Published in Annual Conference for Protective Relay Engineers : [proceedings] (01.04.2016)
Get full text
Conference Proceeding
Loading…
Review of Automated Vulnerability Analysis of Smart Contracts on Ethereum
Rameder, Heidelinde, di Angelo, Monika, Salzer, Gernot
Published in Frontiers in blockchain (24.03.2022)
Published in Frontiers in blockchain (24.03.2022)
Get full text
Journal Article
Loading…
Mobile Mental Health Apps: Alternative Intervention or Intrusion?
Saini, Shalini, Panjwani, Dhiral, Saxena, Nitesh
Published in 2022 19th Annual International Conference on Privacy, Security & Trust (PST) (22.08.2022)
Published in 2022 19th Annual International Conference on Privacy, Security & Trust (PST) (22.08.2022)
Get full text
Conference Proceeding
Loading…
Loading…