-
1
Design and implementation ofserver security alarm system in campus network
Published 2014-10-01Subjects: Get full text
Article -
2
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: Get full text
Article -
3
Distinguishing Reality from AI: Approaches for Detecting Synthetic Content
Published 2024-12-01Subjects: Get full text
Article -
4
Design and implementation of national security vulnerability database
Published 2011-01-01Subjects: Get full text
Article -
5
Research and implementation of fuzzing testing based on HTTP proxy
Published 2016-02-01Subjects: Get full text
Article -
6
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01Subjects: Get full text
Article -
7
G-O vulnerability forecasting model and its improvement based on loss
Published 2015-12-01Subjects: “…security vulnerability…”
Get full text
Article -
8
Survey of attack graph based network security metric
Published 2018-09-01Subjects: Get full text
Article -
9
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article