咨询与建议

限定检索结果

文献类型

  • 131 篇 会议
  • 99 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 235 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 220 篇 工学
    • 175 篇 计算机科学与技术...
    • 104 篇 软件工程
    • 55 篇 电气工程
    • 28 篇 信息与通信工程
    • 20 篇 控制科学与工程
    • 7 篇 网络空间安全
    • 5 篇 机械工程
    • 5 篇 电子科学与技术(可...
    • 2 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 安全科学与工程
  • 23 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 16 篇 理学
    • 13 篇 数学
    • 4 篇 系统科学
    • 2 篇 物理学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 教育学
    • 2 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 1 篇 法学
    • 1 篇 政治学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 235 篇 software vulnera...
  • 34 篇 software securit...
  • 24 篇 deep learning
  • 18 篇 machine learning
  • 13 篇 information secu...
  • 12 篇 vulnerability de...
  • 12 篇 fuzzing
  • 8 篇 cybersecurity
  • 8 篇 security
  • 8 篇 buffer overflow
  • 7 篇 symbolic executi...
  • 7 篇 patching
  • 6 篇 static analysis
  • 6 篇 cvss
  • 6 篇 cve
  • 5 篇 risk assessment
  • 5 篇 severity
  • 5 篇 software
  • 4 篇 cyber security
  • 4 篇 program analysis

机构

  • 10 篇 jiangsu univ sch...
  • 4 篇 univ ghana dept ...
  • 4 篇 univ turku turku
  • 4 篇 univ adelaide cr...
  • 4 篇 nanyang technol ...
  • 3 篇 univ profess stu...
  • 3 篇 univ erlangen nu...
  • 3 篇 korea univ dept ...
  • 3 篇 cyber secur coop...
  • 3 篇 school of comput...
  • 3 篇 cyber secur coop...
  • 2 篇 yangzhou univ sc...
  • 2 篇 colorado state u...
  • 2 篇 univ lubeck inst...
  • 2 篇 tsinghua univ de...
  • 2 篇 monash univ clay...
  • 2 篇 xi an jiao tong ...
  • 2 篇 univ nottingham ...
  • 2 篇 harbin inst tech...
  • 2 篇 tsinghua univ in...

作者

  • 10 篇 chen jinfu
  • 8 篇 ruohonen jukka
  • 7 篇 kudjo patrick kw...
  • 7 篇 babar m. ali
  • 5 篇 lee heejo
  • 5 篇 mensah solomon
  • 4 篇 feng chao
  • 4 篇 malaiya yashwant...
  • 4 篇 li yuekang
  • 4 篇 leppanen ville
  • 4 篇 saglietti france...
  • 4 篇 al sardy loui
  • 4 篇 tang chaojing
  • 4 篇 sultana kazi zak...
  • 3 篇 mirakhorli mehdi
  • 3 篇 gao cuiyun
  • 3 篇 wang haijun
  • 3 篇 croft roland
  • 3 篇 liu yang
  • 3 篇 nong yu

语言

  • 232 篇 英文
  • 2 篇 其他
  • 1 篇 土耳其文
检索条件"主题词=Software vulnerability"
235 条 记 录,以下是1-10 订阅
排序:
NG_MDERANK: A software vulnerability feature knowledge extraction method based on N-gram similarity
收藏 引用
JOURNAL OF software-EVOLUTION AND PROCESS 2025年 第1期37卷
作者: Wu, Xiaoxue Weng, Shiyu Zheng, Bin Zheng, Wei Chen, Xiang Sun, Xiaobin Yangzhou Univ Sch Informat Engn Yangzhou Peoples R China Northwestern Polytech Univ Sch Software Xian Peoples R China Nantong Univ Sch Informat Sci & Technol Nantong Peoples R China
As software grows in size and complexity, software vulnerabilities are increasing, leading to a range of serious insecurity issues. Open-source software vulnerability reports and documentation can provide researchers ... 详细信息
来源: 评论
Hybrid feature selection module for improving performance of software vulnerability severity prediction model on textual dataset
收藏 引用
COMPUTING 2025年 第2期107卷 1-37页
作者: Malhotra, Ruchika Vidushi Delhi Technol Univ Software Engn Dept Delhi India Vivekananda Inst Profess Studies Sch Engn & Technol Tech Campus Delhi India
software vulnerability severity prediction is a critical area in software engineering, where model performance heavily depends on the quality of the feature set used for training. Challenges such as feature redundancy... 详细信息
来源: 评论
FORTIFYING ANDROID SECURITY: HYPERPARAMETER TUNED DEEP LEARNING APPROACH FOR ROBUST software vulnerability DETECTION
收藏 引用
FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY 2025年 第2期33卷
作者: Alzaben, Nada Alashjaee, Abdullah m. Maray, Mohammed Alotaibi, Shoayee dlaim Alharbi, Abeer a. k. Sayed, Ahmed Princess Nourah bint Abdulrahman Univ PNU Coll Comp & Informat Sci Dept Comp Sci POB 84428 Riyadh 11671 Saudi Arabia Northern Border Univ Fac Comp & Informat Technol Dept Comp Sci Rafha 91911 Saudi Arabia King Khalid Univ Coll Comp Sci Dept Informat Syst Abha Saudi Arabia Univ Hail Coll Comp Sci & Engn Dept Artificial Intelligence & Data Sci Hail Saudi Arabia Imam Mohammad Ibn Saud Islamic Univ IMSIU Coll Comp & Informat Sci Dept Informat Syst Riyadh 11432 Saudi Arabia Future Univ Egypt Egypt Res Ctr New Cairo 11835 Egypt
Detecting software vulnerabilities is a vital component of cybersecurity, concentrating on identifying and remedying weaknesses or flaws in software that malicious actors could exploit. Improving Android security incl... 详细信息
来源: 评论
Improving software vulnerability severity prediction model performance with HDLN & FWFS: a two-stage feature selection approach
收藏 引用
software QUALITY JOURNAL 2025年 第1期33卷 1-32页
作者: Malhotra, Ruchika Vidushi Delhi Technol Univ Dept Software Engn New Delhi India Vivekananda Inst Profess Studies Tech Campus Sch Engn & Technol New Delhi India
software vulnerability Severity Prediction (SVSP) is an evolving domain of software engineering. Ensuring the robustness and continuous operation of software systems relies heavily on the accuracy of SVSP models. Howe... 详细信息
来源: 评论
software vulnerability Detection: A Comparison of Statistical and Machine Learning Algorithms
收藏 引用
INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING 2025年
作者: Peerzada, Bareen Kumar, Deepak Amity Univ Amity Inst Informat Technol Noida Uttar Pradesh India
software vulnerabilities can be defined as potential threats to an existing software structure. With the advent of networks and the internet to far and wide places, the software has become vulnerable to attacks by ele... 详细信息
来源: 评论
software vulnerability Detection Using Deep Neural Networks: A Survey
收藏 引用
PROCEEDINGS OF THE IEEE 2020年 第10期108卷 1825-1848页
作者: Lin, Guanjun Wen, Sheng Han, Qing-Long Zhang, Jun Xiang, Yang Sanming Univ Sch Informat Engn Sanming 365004 Fujian Peoples R China Swinburne Univ Technol Sch Software & Elect Engn Melbourne Vic 3122 Australia
The constantly increasing number of disclosed security vulnerabilities have become an important concern in the software industry and in the field of cybersecurity, suggesting that the current approaches for vulnerabil... 详细信息
来源: 评论
software vulnerability: Definition, modelling, and practical evaluation for e-mail transfer software
收藏 引用
INTERNATIONAL JOURNAL OF PRESSURE VESSELS AND PIPING 2006年 第4期83卷 256-261页
作者: Kimura, Mitsuhiro Hosei Univ Fac Engn Dept Ind & Syst Engn Koganei Tokyo 1848584 Japan
This paper proposes a method of assessing software vulnerability quantitatively. By expanding the concept of the IPO (input-program-output) model, we first define the software vulnerability and construct a stochastic ... 详细信息
来源: 评论
software vulnerability Assessment: Vendor, Scanner, and User Analysis  13
Software Vulnerability Assessment: Vendor, Scanner, and User...
收藏 引用
13th IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
作者: Boonchuay, Kietthibhum Siripaktanakon, Wachirawich Sangpetch, Orathai Sangpetch, Akkarit
Given the complexity of existing software stacking on top of each other, many vulnerabilities are just waiting to be discovered. Certain vulnerabilities can lead to severe exploitation and loss. In this paper, we try ... 详细信息
来源: 评论
software vulnerability Severity Evaluation Based on Economic Losses  1
收藏 引用
International Standard Conference on Trustworthy Computing and Services (ISCTCS)
作者: Yang, Yunxue Jin, Shuyuan He, Xiaowei Chinese Acad Sci Inst Comp Technol CAS Key Lab Network Data Sci & Technol Beijing Peoples R China
Enterprises suffer economic losses due to vulnerability exploitation. The aim of this paper is to propose a comprehensive software vulnerability severity evaluation model incorporating technical assessment and circums... 详细信息
来源: 评论
software vulnerability Detection using Large Language Models  34
Software Vulnerability Detection using Large Language Models
收藏 引用
34th IEEE International Symposium on software Reliability Engineering (ISSRE)
作者: Das Purba, Moumita Ghosh, Arpita Radford, Benjamin J. Chu, Bill Univ N Carolina Dept Software & Informat Syst Charlotte NC 28223 USA Univ N Carolina Dept Polit Sci & Publ Adm Charlotte NC USA
software development is among the first demonstrations of using Large Language Models (LLMs) to enhance human productivity. Such a co-pilot paradigm envisions LLM working side-by-side with human developers to assist i... 详细信息
来源: 评论