咨询与建议

限定检索结果

文献类型

  • 23 篇 期刊文献

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 20 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 4 篇 网络空间安全
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 23 篇 software securit...
  • 2 篇 deep learning
  • 2 篇 static analysis
  • 2 篇 vulnerability mi...
  • 2 篇 software testing
  • 2 篇 vulnerability
  • 2 篇 fuzzing
  • 2 篇 web application
  • 1 篇 durability of se...
  • 1 篇 runtime verifica...
  • 1 篇 flipped classroo...
  • 1 篇 embedded systems
  • 1 篇 coverage-based f...
  • 1 篇 code metrics
  • 1 篇 group decision m...
  • 1 篇 control flow int...
  • 1 篇 multi-attribute ...
  • 1 篇 vulnerability di...
  • 1 篇 fuzzy ahp
  • 1 篇 control flow obf...

机构

  • 1 篇 school of comput...
  • 1 篇 china informatio...
  • 1 篇 school of cyber ...
  • 1 篇 mengzi vocationa...
  • 1 篇 institute of com...
  • 1 篇 school of mathem...
  • 1 篇 eletrical engine...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 school of softwa...
  • 1 篇 institute of inf...
  • 1 篇 computer school ...
  • 1 篇 beijing keylabor...
  • 1 篇 college of compu...
  • 1 篇 institute of sys...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of co...

作者

  • 2 篇 rajeev kumar
  • 2 篇 hu changzhen
  • 2 篇 chao zhang
  • 2 篇 alka agrawal
  • 2 篇 raees ahmad khan
  • 1 篇 leng bingxing
  • 1 篇 xue jingfeng
  • 1 篇 yong peng
  • 1 篇 shan chun
  • 1 篇 wael alosaimi
  • 1 篇 mohd faizan
  • 1 篇 guo xiaojing
  • 1 篇 josé luis fernán...
  • 1 篇 guanyu su
  • 1 篇 yulong zhang
  • 1 篇 richa verma
  • 1 篇 gen zhang
  • 1 篇 noama fatima sam...
  • 1 篇 haijing xing
  • 1 篇 tai yue

语言

  • 22 篇 英文
  • 1 篇 中文
检索条件"主题词=Software Security"
23 条 记 录,以下是1-10 订阅
排序:
Evaluating the Impact of software security Tactics: A Design Perspective
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 2283-2299页
作者: Mamdouh Alenezi Abhishek Kumar Pandey Richa Verma Mohd Faizan Shalini Chandra Alka Agrawal Rajeev Kumar Raees Ahmad Khan College of Computer and Information Sciences Prince Sultan UniversitySaudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknowUttar PradeshIndia Department of Computer Science Babasaheb Bhimrao Ambedkar UniversityLucknowUttar PradeshIndia Department of Computer Application Shri Ramswaroop Memorial UniversityLucknowUttar PradeshIndia
Design architecture is the edifice that strengthens the functionalities as well as the security of web *** order to facilitate architectural security from the web application’s design phase itself,practitioners are n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fuzzing:Progress,Challenges,and Perspectives
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1-29页
作者: Zhenhua Yu Zhengqi Liu Xuya Cong Xiaobo Li Li Yin Institute of Systems security and Control College of Computer Science and TechnologyXi'an University of Science and TechnologyXi'an710054China School of Mathematics and Information Science Baoji University of Arts and SciencesBaoji721013China Institute of Systems Engineering Macao University of Science and TechnologyTaipaMacaoChina
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
software Vulnerability Mining and Analysis Based on Deep Learning
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3263-3287页
作者: Shibin Zhao Junhu Zhu Jianshan Peng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technolog... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Anticipatory active monitoring for safety-and security-critical software
收藏 引用
Science China(Information Sciences) 2012年 第12期55卷 2723-2737页
作者: Martin LEUCKER Institute of software Technology and Programming Languages University of Lbeck
Since formal verification and testing of systems is normally faced with challenges such as state explosion and uncertain execution environments,it is extremely difficult to exhaustively verify and test software during... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
software Defect Prediction via Deep Belief Network
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 925-932页
作者: WEI Hua SHAN Chun HU Changzhen ZHANG Yu YU Xiao School of Computer Science and Technology Beijing Institute of Technology China Information Technology security Evaluation Center Beijing Key Laboratory of software security Engineering Technology Beijing Institute of Technology School of Electrical and Information Engineering and Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture State Key Laboratory in China for Geomechanics and Deep Underground Engineering (Beijing) China University of Mining and Technology School of Computer Science and Technology Shandong University of Technology
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels
收藏 引用
Journal of Computer Science & Technology 2021年 第6期36卷 1248-1268页
作者: Gen Zhang Peng-Fei Wang Tai Yue Xu Zhou Kai Lu College of Computer National University of Defense TechnologyChangsha 410073China
Allocation,dereferencing,and freeing of memory data in kernels are coherently *** widely exist real cases where the correctness of memory is *** incorrectness in kernel memory brings about significant security issues,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
software Vulnerabilities Overview:A Descriptive Study
收藏 引用
Tsinghua Science and Technology 2020年 第2期25卷 270-280页
作者: Mario Calín Sánchez Juan Manuel Carrillo de Gea José Luis Fernández-Alemán Jesús Garcerán Ambrosio Toval the Department of Informatics and Systems Faculty of Computer ScienceUniversity of Murcia
Computer security is a matter of great *** the last decade there have been numerous cases of cybercrime based on the exploitation of software *** fact has generated a great social concern and a greater importance of c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Unleashing the power of pseudo-code for binary code similarity analysis
收藏 引用
Cybersecurity 2023年 第2期6卷 44-61页
作者: Weiwei Zhang Zhengzi Xu Yang Xiao Yinxing Xue School of Computer Science and Engineering University of Science and Technology of ChinaHefeiChina School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Accurate and efficient exploit capture and classification
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 193-209页
作者: Yu DING Tao WEI Hui XUE Yulong ZHANG Chao ZHANG Xinhui HAN Institute of Computer Science and Technology Peking University Eletrical Engineering and Computer Sciences UC Berkeley
software exploits, especially zero-day exploits, are major security threats. Every day, security experts discover and collect numerous exploits from honeypots, malware forensics, and underground ***, no easy methods e... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Selecting Best software Vulnerability Scanner Using Intuitionistic Fuzzy Set TOPSIS
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3613-3629页
作者: Navneet Bhatt Jasmine Kaur Adarsh Anand Omar H.Alhazmi Anil Surendra Modi School of Commerce Narsee Monjee Institute of Management StudiesDeemed to be UniversityMumbai400056India Department of Operational Research Faculty of Mathematical SciencesUniversity of DelhiDelhi110007India Department of Computer Science Taibah UniversityMedina30001Saudi Arabia
software developers endeavor to build their products with the least number of *** this,many vulnerabilities are detected in software that threatens its *** automated software i.e.,vulnerability scanners,are available ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论