-
1
Design and implementation of national security vulnerability database
Published 2011-01-01Subjects: Get full text
Article -
2
Research and implementation of fuzzing testing based on HTTP proxy
Published 2016-02-01Subjects: Get full text
Article -
3
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01Subjects: Get full text
Article -
4
G-O vulnerability forecasting model and its improvement based on loss
Published 2015-12-01Subjects: “…security vulnerability…”
Get full text
Article -
5
Survey of attack graph based network security metric
Published 2018-09-01Subjects: Get full text
Article -
6
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
7
Design and implementation ofserver security alarm system in campus network
Published 2014-10-01Subjects: Get full text
Article -
8
Secure software development: leveraging application call graphs to detect security vulnerabilities
Published 2025-01-01Subjects: Get full text
Article -
9
Distinguishing Reality from AI: Approaches for Detecting Synthetic Content
Published 2024-12-01Subjects: Get full text
Article