Search

Your search keyword '"software security"' showing total 1,236 results

Search Constraints

Start Over You searched for: Descriptor "software security" Remove constraint Descriptor: "software security"
1,236 results on '"software security"'

Search Results

1. Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering.

2. A SWOT Analysis of Software Development Life Cycle Security Metrics.

3. Early mitigation of CPU-optimized ransomware using monitoring encryption instructions.

4. TACSan: Enhancing Vulnerability Detection with Graph Neural Network.

5. eGMT-Fuzz: Format-Aware Deep Fuzzing of Cryptographic Protocols

8. Algorithm for the functioning of the analysis and evaluation software package security of software of automated systems internal affairs bodies

9. Multi-class vulnerability prediction using value flow and graph neural networks.

10. NG_MDERANK: A software vulnerability feature knowledge extraction method based on N‐gram similarity.

11. Software Vulnerability Fuzz Testing: A Mutation-Selection Optimization Systematic Review.

12. Software Vulnerability Mining and Analysis Based on Deep Learning.

13. A catalog of metrics at source code level for vulnerability prediction: A systematic mapping study.

14. Enhancing Software Code Vulnerability Detection Using GPT-4o and Claude-3.5 Sonnet: A Study on Prompt Engineering Techniques.

15. Deep Domain Adaptation With Max-Margin Principle for Cross-Project Imbalanced Software Vulnerability Detection.

16. Fuzzing Robotic Software Using HPC and LLM

18. Predicting Code Vulnerability Types via Heterogeneous GNN Learning

19. Towards Analysis of Threat Modeling of Software Systems According to Key Criteria

20. A Method Based on Behavior Driven Development (BDD) and System-Theoretic Process Analysis (STPA) for Verifying Security Requirements in Critical Software Systems

21. Web3 and Supply Chain Risks

23. Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations

24. Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis

26. An Empirical Study of the Imbalance Issue in Software Vulnerability Detection

27. Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection

29. RAMA: a risk assessment solution for healthcare organizations.

30. WolfFuzz: A Dynamic, Adaptive, and Directed Greybox Fuzzer.

31. Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories.

32. A Game-Theoretical Self-Adaptation Framework for Securing Software-Intensive Systems.

33. Using software metrics for predicting vulnerable classes in java and python based systems.

34. Data transmission channel protection organization in client-server software architecture.

35. A Survey of Binary Code Similarity Detection Techniques.

36. Detecting SQL injection attacks by binary gray wolf optimizer and machine learning algorithms.

37. Vulnerability analysis based on Software Bill of Materials (SBOM): A model proposal for automated vulnerability scanning for CI/CD pipelines.

38. There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability Detection †.

39. FFRA: A Fine-Grained Function-Level Framework to Reduce the Attack Surface.

40. MACHINE LEARNING FOR SOFTWARE SECURITY TESTING.

41. Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction

42. On the Code Vulnerability Detection Based on Deep Learning: A Comparative Study

43. Automated Intel SGX Integration for Enhanced Application Security

47. Security risks of global software development life cycle: Industry practitioner's perspective.

48. Vision Transformer Inspired Automated Vulnerability Repair.

50. Estimating vulnerability metrics with word embedding and multiclass classification methods.

Catalog

Books, media, physical & digital resources