咨询与建议

限定检索结果

文献类型

  • 44 篇 会议
  • 32 册 图书
  • 21 篇 期刊文献
  • 3 篇 学位论文

馆藏范围

  • 100 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 61 篇 工学
    • 50 篇 计算机科学与技术...
    • 19 篇 电气工程
    • 14 篇 软件工程
    • 11 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 交通运输工程
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 9 篇 理学
    • 4 篇 物理学
    • 3 篇 数学
    • 2 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 8 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 1 篇 工商管理
    • 1 篇 公共管理
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 作物学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 100 篇 exploits
  • 23 篇 vulnerabilities
  • 12 篇 security
  • 6 篇 cia
  • 6 篇 machine learning
  • 5 篇 crest
  • 5 篇 general cia reco...
  • 5 篇 central intellig...
  • 5 篇 malware
  • 4 篇 being
  • 4 篇 rippub
  • 4 篇 cybersecurity
  • 4 篇 vulnerability
  • 3 篇 internet of thin...
  • 3 篇 threats
  • 3 篇 cyber security
  • 3 篇 famous
  • 3 篇 open source
  • 3 篇 gerard
  • 3 篇 computer securit...

机构

  • 2 篇 colorado state u...
  • 2 篇 delft univ techn...
  • 2 篇 yokohama natl un...
  • 2 篇 res & acad comp ...
  • 1 篇 fdn bruno kessle...
  • 1 篇 thapar univ dept...
  • 1 篇 usn postgrad sch...
  • 1 篇 univ michigan an...
  • 1 篇 natl chiao tung ...
  • 1 篇 cranfield univ c...
  • 1 篇 devcom army res ...
  • 1 篇 univ fed rio de ...
  • 1 篇 tu wien austria
  • 1 篇 information tech...
  • 1 篇 univ tecnolog pe...
  • 1 篇 univ strasbourg ...
  • 1 篇 georgia institut...
  • 1 篇 univ oslo oslo
  • 1 篇 univ new s wales...
  • 1 篇 univ calif irvin...

作者

  • 3 篇 lewandowski piot...
  • 3 篇 de aguiar leandr...
  • 3 篇 janiszewski mare...
  • 3 篇 rytel marcin
  • 2 篇 menasche daniel ...
  • 2 篇 miranda lucas
  • 2 篇 sameshima kaichi
  • 2 篇 malaiya yashwant...
  • 2 篇 romanowski huber...
  • 2 篇 sen ravi
  • 2 篇 al alsadi arwa a...
  • 2 篇 holzinger philip...
  • 2 篇 massacci fabio
  • 2 篇 holm hannes
  • 2 篇 van eeten michel
  • 2 篇 yoshioka katsuna...
  • 2 篇 priyanka ajjarap...
  • 2 篇 zaverucha gerson
  • 2 篇 felkner anna
  • 1 篇 bosman erik

语言

  • 96 篇 英文
  • 2 篇 其他
  • 1 篇 德文
  • 1 篇 中文
检索条件"主题词=exploits"
100 条 记 录,以下是1-10 订阅
排序:
A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and exploits
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2023年 第3期20卷 3782-3802页
作者: Pereira, Caina Figueiredo Lopes de Oliveira, Joao Gabriel Santos, Rodrigo Azevedo Vieira, Daniel Miranda, Lucas Zaverucha, Gerson de Aguiar, Leandro Pfleger Menasche, Daniel Sadoc Univ Fed Rio de Janeiro Syst & Comp Engn Program BR-21941901 Rio De Janeiro Brazil Mondu GmbH D-10179 Berlin Germany Univ Fed Rio de Janeiro Inst Comp BR-21941901 Rio De Janeiro Brazil Siemens Technol Princeton NJ 08540 USA Amazon Bellevue WA USA
Data on software vulnerabilities, products, and exploits are typically collected from multiple non-structured sources. Valuable information, e.g., on which products are affected by which exploits, is conveyed by match... 详细信息
来源: 评论
TriAssetRank: Ranking Vulnerabilities, exploits, and Privileges for Countermeasures Prioritization
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 10189-10205页
作者: Bouom, Aymar Le Pere Tchimwa Lienou, Jean-Pierre Geh, Wilson Ejuh Nelson, Frederica Free Shetty, Sachin Kamhoua, Charles Univ Dschang Math & Comp Sci Dept Fac Sci Dschang Cameroon DEVCOM Army Res Lab Adelphi MD 20783 USA Old Dominion Univ Dept Elect & Comp Engn Norfolk VA 23529 USA
Network defence practices have no standardized mechanism for determining the priority of threat events. Prioritization of cyber vulnerabilities intends to make network administrators focus on the most critical points ... 详细信息
来源: 评论
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2015年 第Feb.期58卷 304-318页
作者: Holm, Hannes Korman, Matus Ekstedt, Mathias Royal Inst Technol Dept Ind Informat & Control Syst S-10044 Stockholm Sweden
Context: Software vulnerabilities in general, and software vulnerabilities with publicly available exploits in particular, are important to manage for both developers and users. This is however a difficult matter to a... 详细信息
来源: 评论
TestREx: a framework for repeatable exploits
收藏 引用
INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER 2019年 第1期21卷 105-119页
作者: Dashevskyi, Stanislav dos Santos, Daniel Ricardo Massacci, Fabio Sabetta, Antonino Univ Trento Trento Italy Fdn Bruno Kessler Trento Italy SAP Labs Sophia Antipolis France
Web applications are the target of many well-known exploits and also a fertile ground for the discovery of security vulnerabilities. Yet, the success of an exploit depends both on the vulnerability in the application ... 详细信息
来源: 评论
Software Vulnerabilities, Products and exploits: A Statistical Relational Learning Approach
Software Vulnerabilities, Products and Exploits: A Statistic...
收藏 引用
IEEE International Conference on Cyber Security and Resilience (IEEE CSR)
作者: Figueiredo, Caina Lopes, Joao Gabriel Azevedo, Rodrigo Zaverucha, Gerson Menasche, Daniel Sadoc de Aguiar, Leandro Pfleger Univ Fed Rio de Janeiro Rio De Janeiro RJ Brazil Siemens Technol Princeton NJ USA
Data on software vulnerabilities, products and exploits is typically collected from multiple non-structured sources. Valuable information, e.g., on which products are affected by which exploits, is conveyed by matchin... 详细信息
来源: 评论
Locating Zero-day exploits With Course-Grained Forensics  14
Locating Zero-day Exploits With Course-Grained Forensics
收藏 引用
14th European Conference on Cyber Warfare and Security (ECCWS)
作者: Kuhn, Stephen Taylor, Stephen Dartmouth Coll Hanover NH 03755 USA
This paper describes a novel coarse-grained forensics capability for locating zero-day exploits by recording and correlating on-host actions with network packets, with no discernible impact on user experience. The cap... 详细信息
来源: 评论
Data Modelling for Predicting exploits  23rd
Data Modelling for Predicting Exploits
收藏 引用
23rd Nordic Conference on Secure IT Systems (NordSec)
作者: Reinthal, Alexander Filippakis, Eleftherios Lef Almgren, Magnus Chalmers Univ Technol Gothenburg Sweden
Modern society is becoming increasingly reliant on secure computer systems. Predicting which vulnerabilities are more likely to be exploited by malicious actors is therefore an important task to help prevent cyber att... 详细信息
来源: 评论
Predicting Cyber Vulnerability exploits with Machine Learning  13
Predicting Cyber Vulnerability Exploits with Machine Learnin...
收藏 引用
13th Scandinavian Conference on Artificial Intelligence
作者: Edkrantz, Michel Said, Alan Recorded Future AB Gothenburg Sweden
For an information security manager it can be a daunting task to keep up and assess which new cyber vulnerabilities to prioritize patching first. Every day numerous new vulnerabilities and exploits are reported for a ... 详细信息
来源: 评论
Markets for Zero-Day exploits: Ethics and Implications  13
Markets for Zero-Day Exploits: Ethics and Implications
收藏 引用
New Security Paradigms Workshop (NSPW)
作者: Egelman, Serge Herley, Cormac van Oorschot, Paul C. Univ Calif Berkeley Berkeley CA 94720 USA Microsoft Res Redmond WA USA Carleton Univ Ottawa ON K1S 5B6 Canada
A New Security Paradigms Workshop (2013) panel discussed the topic of ethical issues and implications related to markets for zero-day exploits, i.e., markets facilitating the sale of previously unknown details on how ... 详细信息
来源: 评论
No Spring Chicken: Quantifying the Lifespan of exploits in IoT Malware Using Static and Dynamic Analysis  22
No Spring Chicken: Quantifying the Lifespan of Exploits in I...
收藏 引用
17th ACM ASIA Conference on Computer and Communications Security 2022 (ACM ASIACCS)
作者: Al Alsadi, Arwa Abdulkarim Sameshima, Kaichi Bleier, Jakob Yoshioka, Katsunari Lindorfer, Martina van Eeten, Michel Ganan, Carlos H. Delft Univ Technol Delft Netherlands Yokohama Natl Univ Yokohama Kanagawa Japan TU Wien Vienna Austria
The Internet of things (IoT) is composed by a wide variety of software and hardware components that inherently contain vulnerabilities. Previous research has shown that it takes only a few minutes from the moment an I... 详细信息
来源: 评论