咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 3 篇 会议
  • 1 册 图书

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 8 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 8 篇 vulnerability ex...
  • 1 篇 advanced penetra...
  • 1 篇 cyber security
  • 1 篇 penetration test...
  • 1 篇 advanced persist...
  • 1 篇 data security
  • 1 篇 hacking tools
  • 1 篇 data defense
  • 1 篇 infrastructure s...
  • 1 篇 patch deployment
  • 1 篇 cyberattack
  • 1 篇 epss
  • 1 篇 lte and ims netw...
  • 1 篇 binary program b...
  • 1 篇 new attack metho...
  • 1 篇 formal analysis
  • 1 篇 social engineeri...
  • 1 篇 real-world hacki...
  • 1 篇 penetration test...
  • 1 篇 attacks

机构

  • 1 篇 symantec res lab...
  • 1 篇 rand santa monic...
  • 1 篇 sch comp sci & t...
  • 1 篇 changchun univ s...
  • 1 篇 kenna secur sant...
  • 1 篇 virginia tech bl...
  • 1 篇 beijing inst tec...
  • 1 篇 imdea software i...
  • 1 篇 univ maryland co...
  • 1 篇 cyentia inst lee...
  • 1 篇 univ florida gai...
  • 1 篇 univ politecn ma...
  • 1 篇 natl univ def te...
  • 1 篇 information secu...
  • 1 篇 natl comp networ...

作者

  • 1 篇 nappa antonio
  • 1 篇 hong yu
  • 1 篇 yang dequan
  • 1 篇 tarek shams
  • 1 篇 yao jinyu
  • 1 篇 yu chuan
  • 1 篇 lei ying
  • 1 篇 zhong jinxin
  • 1 篇 roytman michael
  • 1 篇 ren weiwu
  • 1 篇 du yazhou
  • 1 篇 edwards benjamin
  • 1 篇 chen shuhui
  • 1 篇 song xintong
  • 1 篇 farahmandi farim...
  • 1 篇 romanosky sasha
  • 1 篇 wei ziling
  • 1 篇 zhang miao
  • 1 篇 wil allsopp
  • 1 篇 an jing

语言

  • 7 篇 英文
  • 1 篇 其他
检索条件"主题词=Vulnerability exploits"
8 条 记 录,以下是1-10 订阅
排序:
A vulnerability exploits detection method based on binary program behavior analysis
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第4期6卷 123-132页
作者: Zhong, Jinxin Fan, Wenqing An, Jing Zhang, Miao Yang, Yixian Information Security Center Beijing University of Posts and Telecommunications Beijing China
Nowadays, vulnerability exploiting has become a major means of malicious code communication. In order to solve the problem that polymorphic and metamorphic vulnerability exploit variants is difficult to detect, it pre... 详细信息
来源: 评论
Toward a Truly Secure Telecom Network: Analyzing and Exploiting Vulnerable Security Configurations/ Implementations in Commercial LTE/IMS Networks
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2024年 第4期21卷 3048-3064页
作者: Yu, Chuan Chen, Shuhui Wei, Ziling Wang, Fei Natl Univ Def Technol Sch Comp Changsha 410073 Hunan Peoples R China
Authentication and data protection (both integrity and confidentiality) between the network and cellular devices are two fundamental security features in 4G/Long Term Evolution (LTE) and IP Multimedia Subsystem (IMS) ... 详细信息
来源: 评论
Exploit Prediction Scoring System (EPSS)
收藏 引用
DIGITAL THREATS: RESEARCH AND PRACTICE 2021年 第3期2卷 1–17页
作者: Jacobs, Jay Romanosky, Sasha Edwards, Benjamin Adjerid, Idris Roytman, Michael Cyentia Inst Leesburg VA 20175 USA RAND Santa Monica CA USA Virginia Tech Blacksburg VA USA Kenna Secur Santa Clara CA USA
Despite the large investments in information security technologies and research over the past decades, the information security industry is still immature when it comes to vulnerability management. In particular, the ... 详细信息
来源: 评论
Benchmarking of SoC-level Hardware Vulnerabilities: A Complete Walkthrough  26
Benchmarking of SoC-level Hardware Vulnerabilities: A Comple...
收藏 引用
26th IEEE-Computer-Society Annual Symposium on VLSI (ISVLSI)
作者: Tarek, Shams Al Shaikh, Hasan Rajendran, Sree Ranjani Farahmandi, Farimah Univ Florida Gainesville FL 32611 USA
Due to the increasing complexity of modern system-on-chips (SoCs) and the diversity of the attack surface, popular SoC verification approaches used in industry and academia for detecting security-critical vulnerabilit... 详细信息
来源: 评论
Design and Implementation of Industrial Control Cyber Range System  12
Design and Implementation of Industrial Control Cyber Range ...
收藏 引用
12th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
作者: Low, Xuan Yang, DeQuan Yang, DengPan Beijing Inst Technol Beijing Peoples R China Sch Comp Sci & Technol Beijing Peoples R China
In the 21st century, world-leading industries are under the accelerated development of digital transformation. Along with information and data resources becoming more transparent on the Internet, many new network tech... 详细信息
来源: 评论
The Attack of the Clones: A Study of the Impact of Shared Code on vulnerability Patching  36
The Attack of the Clones: A Study of the Impact of Shared Co...
收藏 引用
IEEE Symposium on Security and Privacy SP
作者: Nappa, Antonio Johnson, Richard Bilge, Leyla Caballero, Juan Dumitras, Tudor IMDEA Software Inst Madrid Spain Univ Maryland College Pk MD 20742 USA Symantec Res Labs Mountain View CA USA Univ Politecn Madrid E-28040 Madrid Spain
vulnerability exploits remain an important mechanism for malware delivery, despite efforts to speed up the creation of patches and improvements in software updating mechanisms. Vulnerabilities in client applications (... 详细信息
来源: 评论
Advanced Penetration Testing  1
收藏 引用
2017年
作者: Wil Allsopp
Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more... 详细信息
来源: 评论
APT Attack Detection Based on Graph Convolutional Neural Networks
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS 2023年 第1期16卷 184-184页
作者: Ren, Weiwu Song, Xintong Hong, Yu Lei, Ying Yao, Jinyu Du, Yazhou Li, Wenjuan Changchun Univ Sci & Technol Sch Comp Sci & Technol Changchun 130000 Jilin Peoples R China Natl Comp Network Emergency Response Ctr Jilin Branch Changchun 130000 Jilin Peoples R China
Advanced persistent threat (APT) attacks are malicious and targeted forms of cyberattacks that pose significant challenges to the information security of governments and enterprises. Traditional detection methods stru... 详细信息
来源: 评论