Showing 1,041 - 1,060 results of 3,341 for search '"information technology"', query time: 0.07s Refine Results
  1. 1041
  2. 1042
  3. 1043
  4. 1044

    Evaluating Mobile Telecom Apps: An Integrated Fuzzy MCDM Model Using Marketing Mix by Hamzeh Mohammad Alabool

    Published 2025-01-01
    “…Typically, telecom providers must invest an amount of company resources to develop and maintain the operations mechanism of information technology platforms (e.g., mobile apps); therefore, it is important to take the issue of marketing effectiveness into account. …”
    Get full text
    Article
  5. 1045
  6. 1046
  7. 1047
  8. 1048
  9. 1049
  10. 1050
  11. 1051
  12. 1052
  13. 1053
  14. 1054
  15. 1055

    High-performance directional fuzzing scheme based on deep reinforcement learning by Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU

    Published 2023-04-01
    “…With the continuous growth and advancement of the Internet and information technology, continuous growth and advancement of the Internet and information technology.Nevertheless, these applications’ vulnerabilities pose a severe threat to information security and users’ privacy.Fuzzing was widely used as one of the main tools for automatic vulnerability detection due to its ease of vulnerability recurrence and low false positive errors.It generates test cases randomly and executes the application by optimization in terms of coverage or sample generation to detect deeper program paths.However, the mutation operation in fuzzing is blind and tends to make the generated test cases execute the same program path.Consequently, traditional fuzzing tests have problems such as low efficiency, high randomness of inputs generation and limited pertinence of the program structure.To address these problems, a directional fuzzing based on deep reinforcement learning was proposed, which used deep reinforcement learning networks with information obtained by staking program to guide the selection of the inputs.Besides, it enabled fast approximation and inspection of the program paths that may exist vulnerabilities.The experimental results showed that the proposed approach had better performance than the popular fuzzing tools such as AFL and AFLGO in terms of vulnerability detection and recurrence on the LAVA-M dataset and real applications like LibPNG and Binutils.Therefore, the approach can provide support for further vulnerability mining and security research.…”
    Get full text
    Article
  16. 1056
  17. 1057
  18. 1058
  19. 1059
  20. 1060