咨询与建议

限定检索结果

文献类型

  • 23 篇 期刊文献

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 20 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 4 篇 网络空间安全
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 航空宇航科学与技...
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 23 篇 software securit...
  • 2 篇 deep learning
  • 2 篇 static analysis
  • 2 篇 vulnerability mi...
  • 2 篇 software testing
  • 2 篇 vulnerability
  • 2 篇 fuzzing
  • 2 篇 web application
  • 1 篇 durability of se...
  • 1 篇 runtime verifica...
  • 1 篇 flipped classroo...
  • 1 篇 embedded systems
  • 1 篇 coverage-based f...
  • 1 篇 code metrics
  • 1 篇 group decision m...
  • 1 篇 control flow int...
  • 1 篇 multi-attribute ...
  • 1 篇 vulnerability di...
  • 1 篇 fuzzy ahp
  • 1 篇 control flow obf...

机构

  • 1 篇 school of comput...
  • 1 篇 china informatio...
  • 1 篇 school of cyber ...
  • 1 篇 mengzi vocationa...
  • 1 篇 institute of com...
  • 1 篇 school of mathem...
  • 1 篇 eletrical engine...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 school of softwa...
  • 1 篇 institute of inf...
  • 1 篇 computer school ...
  • 1 篇 beijing keylabor...
  • 1 篇 college of compu...
  • 1 篇 institute of sys...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of co...

作者

  • 2 篇 rajeev kumar
  • 2 篇 hu changzhen
  • 2 篇 chao zhang
  • 2 篇 alka agrawal
  • 2 篇 raees ahmad khan
  • 1 篇 leng bingxing
  • 1 篇 xue jingfeng
  • 1 篇 yong peng
  • 1 篇 shan chun
  • 1 篇 wael alosaimi
  • 1 篇 mohd faizan
  • 1 篇 guo xiaojing
  • 1 篇 josé luis fernán...
  • 1 篇 guanyu su
  • 1 篇 yulong zhang
  • 1 篇 richa verma
  • 1 篇 gen zhang
  • 1 篇 noama fatima sam...
  • 1 篇 haijing xing
  • 1 篇 tai yue

语言

  • 22 篇 英文
  • 1 篇 中文
检索条件"主题词=Software Security"
23 条 记 录,以下是11-20 订阅
排序:
Embedded fuzzing:a review of challenges,tools,and solutions
收藏 引用
Cybersecurity 2022年 第4期5卷 1-18页
作者: Max Eisele Marcello Maugeri Rachna Shriwas Christopher Huth Giampaolo Bella Safety Security and PrivacyRobert Bosch GmbHRenningenGermany Dept.of Math and Computer Science Universita degli Studi di CataniaCataniaItaly RBEl Robert Bosch GmbHBangaloreIndia.
Fuzzing has become one of the best-established methods to uncover software ***,the market of embedded systems,which binds the software execution tightly to the very hardware architecture,has grown at a steady pace,and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Mitigating ROP Attacks via ARM-Specific In-Place Instruction Randomization
收藏 引用
China Communications 2016年 第9期13卷 208-226页
作者: Yu Liang Key Laboratory of Aerospace Information security and Trust Computing of Ministry of Education Wuhan 430079China Computer School of Wuhan University Wuhan 430079China
Defending against return-oriented programing(ROP) attacks is extremely challenging for modern operating *** the most popular mobile OS running on ARM,Android is even more vulnerable to ROP attacks due to its weak impl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Evaluating the Impacts of security-Durability Characteristic:Data Science Perspective
收藏 引用
Computer Systems Science & Engineering 2022年 第5期41卷 557-567页
作者: Abdullah Alharbi Masood Ahmad Wael Alosaimi Hashem Alyami Alka Agrawal Rajeev Kumar Abdul Wahid Raees Ahmad Khan Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025India Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Applications Shri Ramswaroop Memorial UniversityBarabanki225003India Department of Computer Science and Information Technology Maulana Azad National Urdu UniversityHyderabad500032India
Since the beginning of web applications,security has been a critical study *** has been a lot of research done to figure out how to define and identify security goals or ***,high-security web apps have been found to b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Control Flow Obfuscation Based Protection Method for Android Applications
收藏 引用
China Communications 2017年 第11期14卷 247-259页
作者: Yong Peng Guanyu Su Bin Tian Maohua Sun Qi Li Beijing University of Posts and Telecommunications No 10 Xitucheng Road Haidian District Beijing 100876 China Beijing KeyLaboratory of Space-ground Interconnection and Convergence No 10 Xitucheng Road Haidian District Beijing 100876 China China Information Technology security Evaluation Center No 1 Building No 8 Shangdixi Road Haidian District Beijing 100085 China Information School Capital University of Economics and Business No 121 Zhangjia Road Fengtai District Beijing 100070 China
With the popularization and rapid development of mobile intelligent terminals(MITs), the number of mobile applications, or apps, has increased exponentially. It is increasingly common for malicious code to be inserted... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An empirical study on the complexity, security and maintainability of Ethereum-based decentralized applications (DApps)
收藏 引用
Blockchain(Research and Applications) 2023年 第2期4卷 28-40页
作者: Noama Fatima Samreen Manar H.Alalfi Department of Computer Science Toronto Metropolitan UniversityTorontoON M5B 2K3Canada
The Ethereum blockchain’s smart contract is a programmable transaction that performs general-purpose computations and can be executed automatically on the *** this component,blockchain technology(BT)has grown beyond ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fuzzing:a survey
收藏 引用
Cybersecurity 2018年 第1期1卷 80-92页
作者: Jun Li Bodong Zhao Chao Zhang Tsinghua University Beijing 100084China
security vulnerability is one of the root causes of cyber-security *** discover vulnerabilities and fix them in advance,researchers have proposed several techniques,among which fuzzing is the most widely used *** rece... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Structured Query Language Injection Penetration Test Case Generation Based on Formal Description
收藏 引用
Journal of Donghua University(English Edition) 2015年 第3期32卷 446-452页
作者: 韩明 苗长云 School of Mechanical Engineering Tianjin Polytechnic University Tianjin 300387 China School of Electronics and Information Engineering Tianjin Polytechnic University Tianjin 300387 China
Aiming to improve the Structured Query Language( SQL) injection penetration test accuracy through the formalismguided test case generation,an attack purpose based attack tree model of SQL injection is proposed,and the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Novel Vulnerability Prediction Model to Predict Vulnerability Loss Based on Probit Regression
收藏 引用
Wuhan University Journal of Natural Sciences 2016年 第3期21卷 214-220页
作者: GENG Jinkun LUO Ping Institute of Computer Networks Tsinghua University School of software Tsinghua University
software vulnerability is always an enormous threat to software security. Quantitative analysis of software vulnerabilities is necessary to the evaluation and improvement of software security. Current vulnerability pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
MSMAM:Testing Resources Allocation,Obtaining Non-Functional Indexes Based on Functional Testing Results,and Evaluating security
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第6期17卷 504-510页
作者: CAO Hui ZHANG Huanguo YAN Fei School of Computer Wuhan UniversityWuhan 430072HubeiChina Key Laboratory of Aerospace Information security and Trust Computing Ministry of EducationWuhan 430072HubeiChina
security testing is a key technology for software *** testing results can reflect the relationship between software testing and software security,and they can help program designers for evaluating and improving softwa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Memory Safety Based on Probabilistic Memory Allocation
收藏 引用
China Communications 2012年 第4期9卷 115-122页
作者: Xue Jingfeng Hu Changzhen Guo Xiaojing Leng Bingxing Ma Rui School of software Beijing Institute of Technology Beijing 100081 P. R. China School of Computer Beijing Uniwrsity of Posts and Telecommunications Beijing 100876 P. R. China
Some unsafe languages,like C and C++,let programmers maximize performance but are vulnerable to memory errors which can lead to program crashes and unpredictable *** to solve the problem,traditional memory allocating ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论