-
1
A detection method of Android system vulnerabilities based on matching
Published 2016-05-01Subjects: Get full text
Article -
2
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01Subjects: “…vulnerability detection…”
Get full text
Article -
3
Research on RTF array overflow vulnerability detection
Published 2017-05-01Subjects: Get full text
Article -
4
Intelligent vulnerability detection system based on graph structured source code slice
Published 2021-10-01Subjects: “…vulnerability detection…”
Get full text
Article -
5
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01Subjects: Get full text
Article -
6
Vulnerability identification technology research based on project version difference
Published 2022-02-01Subjects: “…vulnerability detection…”
Get full text
Article -
7
Design and implementation of OSPF vulnerability analysis and detection system
Published 2013-09-01Subjects: Get full text
Article -
8
Research on context-aware Android application vulnerability detection
Published 2021-11-01Subjects: “…Android vulnerability detection…”
Get full text
Article -
9
Automatic detection method of software upgrade vulnerability based on network traffic analysis
Published 2020-02-01Subjects: Get full text
Article -
10
Code vulnerability detection method based on graph neural network
Published 2021-06-01Subjects: “…vulnerability detection…”
Get full text
Article -
11
IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
Published 2025-01-01Subjects: Get full text
Article -
12
Survey on static software vulnerability detection for source code
Published 2019-02-01Subjects: Get full text
Article -
13
HyQ2: A Hybrid Quantum Neural Network for NextG Vulnerability Detection
Published 2024-01-01Subjects: “…NextG vulnerability detection…”
Get full text
Article -
14
Smart contract vulnerability detection method based on pre-training and novel timing graph neural network
Published 2024-09-01Subjects: Get full text
Article -
15
Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study
Published 2025-01-01Subjects: Get full text
Article -
16
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01Subjects: Get full text
Article -
17
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
18
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
Published 2025-01-01Subjects: Get full text
Article