咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 化学工程与技术
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 化学

主题

  • 2 篇 source code vuln...
  • 1 篇 exploitable vuln...
  • 1 篇 software securit...
  • 1 篇 feature profile
  • 1 篇 buffer overflow
  • 1 篇 classification
  • 1 篇 taxonomy
  • 1 篇 source code feat...
  • 1 篇 source code vuln...
  • 1 篇 deep graph convo...

机构

  • 1 篇 posts & telecomm...
  • 1 篇 mimos berhad tpm...
  • 1 篇 univ teknol mara...

作者

  • 1 篇 ahmad nurul hasz...
  • 1 篇 do xuan cho
  • 1 篇 aljunid syed ahm...
  • 1 篇 ab manan jamalul...

语言

  • 2 篇 英文
检索条件"主题词=source code vulnerabilities"
2 条 记 录,以下是1-10 订阅
排序:
Taxonomy of C Overflow vulnerabilities Attack
Taxonomy of C Overflow Vulnerabilities Attack
收藏 引用
2nd International Conference on Software Engineering and Computing Systems (ICSECS 2011)
作者: Ahmad, Nurul Haszeli Aljunid, Syed Ahmad Ab Manan, Jamalul-lail MIMOS Berhad TPM Bukit Jalil Kuala Lumpur 57000 Malaysia Univ Teknol MARA Fac Comp Sci & Math Shah Alam 40000 Selangor Malaysia
Various software vulnerabilities classifications have been constructed since the early 70s for correct understanding of vulnerabilities, and thus acts as a strong foundation to protect and prevent software from exploi... 详细信息
来源: 评论
A new approach to software vulnerability detection based on CPG analysis
收藏 引用
COGENT ENGINEERING 2023年 第1期10卷
作者: Do Xuan, Cho Posts & Telecommun Inst Technol Fac Informat Secur Hanoi Vietnam
Detecting source code vulnerabilities is an essential issue today. In this paper, to improve the efficiency of detecting vulnerabilities in software written in C/C++, we propose to use a combination of Deep Graph Conv... 详细信息
来源: 评论