咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 8 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 2 篇 电气工程
  • 1 篇 理学
    • 1 篇 数学

主题

  • 8 篇 source code vuln...
  • 4 篇 software securit...
  • 2 篇 code property gr...
  • 2 篇 machine learning
  • 2 篇 source code vuln...
  • 2 篇 data rebalancing
  • 1 篇 source embedding
  • 1 篇 software supply ...
  • 1 篇 quantum computin...
  • 1 篇 software vulnera...
  • 1 篇 deep learning
  • 1 篇 natural language...
  • 1 篇 software securit...
  • 1 篇 vulnerability de...
  • 1 篇 contrastive lear...
  • 1 篇 quantum machine ...
  • 1 篇 roberta
  • 1 篇 android security
  • 1 篇 software and app...
  • 1 篇 feature profile

机构

  • 2 篇 posts & telecomm...
  • 2 篇 kennesaw state u...
  • 2 篇 kennesaw state u...
  • 2 篇 kennesaw state u...
  • 1 篇 tennessee techno...
  • 1 篇 univ kelaniya ke...
  • 1 篇 kennesaw state u...
  • 1 篇 kennesaw state u...
  • 1 篇 faculty of infor...
  • 1 篇 birmingham city ...
  • 1 篇 tuskegee univ de...
  • 1 篇 univ econ & tech...
  • 1 篇 univ doha sci & ...
  • 1 篇 robert gordon un...
  • 1 篇 univ edinburgh e...
  • 1 篇 posts & telecomm...
  • 1 篇 department of in...
  • 1 篇 univ politehn bu...
  • 1 篇 middlesex univ l...
  • 1 篇 marquette univ d...

作者

  • 2 篇 kalutarage harsh...
  • 2 篇 senanayake janak...
  • 2 篇 faruk md jobair ...
  • 2 篇 shahriar hossain
  • 2 篇 masum mohammad
  • 2 篇 al-kadri mhd oma...
  • 1 篇 nguyen phuong th...
  • 1 篇 van cong bui
  • 1 篇 barzanjeh shabir
  • 1 篇 rebedea traian
  • 1 篇 valero maria
  • 1 篇 zaharia sergiu
  • 1 篇 do cho xuan
  • 1 篇 cho do xuan
  • 1 篇 khan md abdullah
  • 1 篇 bin nazim mohamm...
  • 1 篇 saglamyurek erha...
  • 1 篇 thanh ma cong
  • 1 篇 sakib nazmus
  • 1 篇 ahamed sheikh iq...

语言

  • 8 篇 英文
检索条件"主题词=Source code vulnerability"
8 条 记 录,以下是1-10 订阅
排序:
Android source code vulnerability Detection: A Systematic Literature Review
收藏 引用
ACM COMPUTING SURVEYS 2023年 第9期55卷 187-187页
作者: Senanayake, Janaka Kalutarage, Harsha Al-Kadri, Mhd Omar Petrovski, Andrei Piras, Luca Robert Gordon Univ Garthdee Rd Aberdeen AB10 7QB Sri Lanka Univ Kelaniya Kelaniya 11600 Western Provinc Sri Lanka Birmingham City Univ Curzon St Birmingham B4 7XG W Midlands England Middlesex Univ London NW4 4BT England
The use of mobile devices is rising daily in this technological era. A continuous and increasing number of mobile applications are constantly offered on mobile marketplaces to fulfil the needs of smartphone users. Man... 详细信息
来源: 评论
A New Framework for Software vulnerability Detection Based on an Advanced Computing
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3699-3723页
作者: Bui Van Cong Cho Do Xuan Department of Information Technology University of Economics and Technical IndustriesHanoi100000Vietnam Faculty of Information Security Posts and Telecommunications Institute of TechnologyHanoi100000Vietnam
The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest *** paper proposes a new framework called DrCSE to improve software vulnerability *** uses an intelligent c... 详细信息
来源: 评论
Optimizing software vulnerability detection using RoBERTa and machine learning
收藏 引用
AUTOMATED SOFTWARE ENGINEERING 2024年 第2期31卷 40-40页
作者: Do, Cho Xuan Luu, Nguyen Trong Nguyen, Phuong Thi Lan Posts & Telecommun Inst Technol Fac Informat Secur Hanoi Vietnam Posts & Telecommun Inst Technol Fac Informat Technol Hanoi Vietnam
Detecting vulnerabilities in source code written in C and C + + is currently essential as attack techniques against systems seek to find, exploit, and attack these vulnerabilities. In this article, to improve the effe... 详细信息
来源: 评论
A novel approach for software vulnerability detection based on intelligent cognitive computing
收藏 引用
JOURNAL OF SUPERCOMPUTING 2023年 第15期79卷 17042-17078页
作者: Xuan, Cho Do Mai, Dao Hoang Thanh, Ma Cong Van Cong, Bui Posts & Telecommun Inst Technol Fac Informat Secur Hanoi Vietnam Univ Edinburgh Edinburgh Scotland Univ Econ & Tech Ind Dept Informat Technol Hanoi Vietnam
Improving and enhancing the effectiveness of software vulnerability detection methods is urgently needed today. In this study, we propose a new source code vulnerability detection method based on intelligent and advan... 详细信息
来源: 评论
Enhancing Security Assurance in Software Development: AI-Based Vulnerable code Detection with Static Analysis
Enhancing Security Assurance in Software Development: AI-Bas...
收藏 引用
28th European Symposium on Research in Computer Security (ESORICS)
作者: Rajapaksha, Sampath Senanayake, Janaka Kalutarage, Harsha Al-Kadri, Mhd Omar Robert Gordon Univ Sch Comp Aberdeen AB10 7QB Scotland Univ Doha Sci & Technol Doha Qatar
The presence of vulnerable source code in software applications is causing significant reliability and security issues, which can be mitigated by integrating and assuring software security principles during the early ... 详细信息
来源: 评论
Systematic Analysis of Deep Learning Model for Vulnerable code Detection  46
Systematic Analysis of Deep Learning Model for Vulnerable Co...
收藏 引用
46th Annual IEEE-Computer-Society International Computers, Software, and Applications Conference (COMPSAC) - Computers, Software, and Applications in an Uncertain World
作者: Bin Nazim, Mohammad Taneem Faruk, Md Jobair Hossain Shahriar, Hossain Khan, Md Abdullah Masum, Mohammad Sakib, Nazmus Wu, Fan Kennesaw State Univ Dept Comp Sci Kennesaw GA 30144 USA Kennesaw State Univ Dept Software Engn & Game Dev Kennesaw GA 30144 USA Kennesaw State Univ Dept Informat Technol Kennesaw GA 30144 USA Kennesaw State Univ Sch Data Sci Kennesaw GA 30144 USA Tuskegee Univ Dept Comp Sci Tuskegee AL 36088 USA
Software vulnerabilities have become a serious problem with the emergence of new applications that contain potentially vulnerable or malicious code that can compromise the system. The growing volume and complexity of ... 详细信息
来源: 评论
Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?  46
Quantum Machine Learning for Software Supply Chain Attacks: ...
收藏 引用
46th Annual IEEE-Computer-Society International Computers, Software, and Applications Conference (COMPSAC) - Computers, Software, and Applications in an Uncertain World
作者: Masum, Mohammad Nazim, Mohammad Faruk, Md Jobair Hossain Shahriar, Hossain Valero, Maria Khan, Md Abdullah Hafiz Uddin, Gias Barzanjeh, Shabir Saglamyurek, Erhan Rahman, Akond Ahamed, Sheikh Iqbal Kennesaw State Univ Analyt & Data Sci Inst Kennesaw GA 30144 USA Kennesaw State Univ Dept Comp Sci Kennesaw GA 30144 USA Kennesaw State Univ Dept Software Engn & Game Dev Kennesaw GA 30144 USA Kennesaw State Univ Dept Informat Technol Kennesaw GA 30144 USA Univ Calgary Inst Quantum Sci & Technol Elect & Software Engn Calgary AB Canada Tennessee Technol Univ Dept Comp Sci Cookeville TN USA Marquette Univ Dept Comp Sci Milwaukee WI 53233 USA
Quantum Computing (QC) has gained immense popularity as a potential solution to deal with the ever-increasing size of data and associated challenges leveraging the concept of quantum random access memory (QRAM). QC pr... 详细信息
来源: 评论
source code vulnerabilities detection using loosely coupled data and control flows  21
Source code vulnerabilities detection using loosely coupled ...
收藏 引用
21st International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)
作者: Zaharia, Sergiu Rebedea, Traian Trausan-Matu, Stefan Univ Politehn Bucuresti Bucharest Romania
Applications are one of the most used attack surfaces, and they must be secured at source code level, early in the development phase. Static Analysis Security Testing solutions, able to detect vulnerabilities in sourc... 详细信息
来源: 评论