57   Artículos

« Anterior     Página: 1 de 3     Siguiente »

 
en línea
Jinghua Groppe, Sven Groppe, Daniel Senf and Ralf Möller    
Given a set of software programs, each being labeled either as vulnerable or benign, deep learning technology can be used to automatically build a software vulnerability detector. A challenge in this context is that there are countless equivalent ways to... ver más
Revista: Information    Formato: Electrónico

 
en línea
Milad Bagheri, Zelina Zaiton Ibrahim, Shattri Mansor, Latifah Abd Manaf, Mohd Fadzil Akhir, Wan Izatul Asma Wan Talaat and Amin Beiranvand Pour    
Climate change is regarded as a serious threat to both environment and humanity, and as a result, it has piqued worldwide attention in the twenty-first century. Natural hazards are expected to have major effects in the coastal cities of the globe. At the... ver más
Revista: Urban Science    Formato: Electrónico

 
en línea
Xin Li, Lu Wang, Yang Xin, Yixian Yang, Qifeng Tang and Yuling Chen    
This study can be applied to software vulnerability detection.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tingyang Gu, Minyan Lu, Luyi Li and Qiuying Li    
Current research on software vulnerability analysis mostly focus on source codes or executable programs. But these methods can only be applied after software is completely developed when source codes are available. This may lead to high costs and tremend... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fayozbek Rustamov, Juhwan Kim and JooBeom Yun    
Fuzz testing is a simple automated software testing approach that discovers software vulnerabilities at a high level of performance by using randomly generated seeds. However, it is restrained by coverage and thus, there are chances of finding bugs entre... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Andrei Brazhuk     Pág. 35 - 41
This work discusses integration of the DBpedia dataset with NVD (National Vulnerability Database) in order to bring some practical results to knowledge management in the field of software security.We have automatically mapped entities (software products ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Yasmany Prieto, Nicolás Boettcher, Silvia Elena Restrepo and Jorge E. Pezoa    
Current data networks are highly homogeneous because of management, economic, and interoperability reasons. This technological homogeneity introduces shared risks, where correlated failures may entirely disrupt the network operation and impair multiple n... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Pietro Russo, Alberto Caponi, Marco Leuti and Giuseppe Bianchi    
Cyber risk management is a very important problem for every company connected to the internet. Usually, risk management is done considering only Risk Analysis without connecting it with Vulnerability Assessment, using external and expensive tools. In thi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ioannis Tsantilis, Thomas K. Dasaklis, Christos Douligeris and Constantinos Patsakis    
Cybersecurity is a never-ending battle against attackers, who try to identify and exploit misconfigurations and software vulnerabilities before being patched. In this ongoing conflict, it is important to analyse the properties of the vulnerability time s... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Hongwei Wei, Guanjun Lin, Lin Li and Heming Jia    
Exploitable vulnerabilities in software systems are major security concerns. To date, machine learning (ML) based solutions have been proposed to automate and accelerate the detection of vulnerabilities. Most ML techniques aim to isolate a unit of source... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Syahrizal Koem     Pág. 355 - 364
Drought is one of the natural disasters that can cause disadvantages, especially in the agricultural sector. Gorontalo Regency is the corn production center, yet it has high vulnerability and low adaptive capacity towards the climate change. In addition,... ver más
Revista: Journal of Natural Resources and Environmental Management    Formato: Electrónico

 
en línea
Kaddour Bahram, Benattou Bouchouicha, Mohamed Benguediab, Abdelkader Slimane     Pág. 261 - 265
In this paper we tried to apply the failure assessment diagram method on an API X60 pipeline under two pressures 70 and 90 bar, this work will be divided into two parts; the first part will be devoted to modeling and simulation of a pipeline under pressu... ver más
Revista: Periodica Polytechnica: Mechanical Engineering    Formato: Electrónico

 
en línea
Esteban Crespo-Martinez    
Databases are usually the main targets of an attack, specifically for the information that they store, since, according to Druker, information is power. In this work vulnerability tests are performed of the database of an ERP software developed in APEX 5... ver más
Revista: Ingenius. Revista de Ciencia y TecnologÍ­a    Formato: Electrónico

 
en línea
Edwin Peralta-Garcia, Juan Quevedo-Monsalbe, Victor Tuesta-Monteza and Juan Arcila-Diaz    
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability. This study compares machine learning algorithms for detecting SQL injections in web microservi... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Sergiu Zaharia, Traian Rebedea and Stefan Trausan-Matu    
The research presented in the paper aims at increasing the capacity to identify security weaknesses in programming languages that are less supported by specialized security analysis tools, based on the knowledge gathered from securing the popular ones, f... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Laura Elizabeth Cavazos González     Pág. 79 - 86
Faced with globalization and its impacts on the promotion of trade, local consumers gained access to international brands and entrepreneurs were able to offer their goods and services in other climes, translating into an economic benefit. Unfortunately, ... ver más
Revista: Journal of Business    Formato: Electrónico

 
en línea
Zafeiria Theodosopoulou, Ioannis M. Kourtis, Vasilis Bellos, Konstantinos Apostolopoulos, Chryssy Potsiou and Vassilios A. Tsihrintzis    
Post-disaster flood risk assessment is extremely difficult owing to the great uncertainties involved in all parts of the assessment exercise, e.g., the uncertainty of hydrologic?hydraulic models and depth?damage curves. In the present study, a robust and... ver más
Revista: Hydrology    Formato: Electrónico

 
en línea
Aakarsh Rao, Nadir A. Carreón, Roman Lysecky and Jerzy Rozenblit    
Life-critical embedded systems, including medical devices, are becoming increasingly interconnected and interoperable, providing great efficiency to the healthcare ecosystem. These systems incorporate complex software that plays a significantly integrati... ver más
Revista: Information    Formato: Electrónico

 
en línea
Efstratios Chatzoglou, Georgios Kambourakis and Vasileios Kouliaridis    
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abdelhay El Omari, Mimoun Chourak, El Mehdi Echebba, Seif-Eddine Cherif, Carlos Navarro Ugena, Mohamed Rougui, Fadi Hage Chehade, Francisco Lamas Fernández and Aboubakr Chaaraoui    
The last seismic events showed that tunnel lining may suffer extensive damage. Employing numerical modeling has a great importance in predicting the seismic performance of tunnels. This paper tests the tunnel lining of the Zaouit Ait Mellal (ZAM) twin tu... ver más
Revista: Infrastructures    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »