„Vulnerability detection“
Suchergebnisse
1.000+ Treffer
-
Cybersicherheit mit Wazuh – Bedrohungen mit Open-Source-Software erkennen, analysieren und abwehren
-
Cybersicherheit mit Wazuh – Bedrohungen mit Open-Source-Software erkennen, analysieren und abwehren
-
DMVL4AVD: a deep multi-view learning model for automated vulnerability detection
-
A novel approach for software vulnerability detection based on advanced computing
-
A novel deep learning-based feature selection model for improving the static analysis of vulnerability detection
-
VulTrLM: LLM-assisted vulnerability detection via AST decomposition and comment enhancement
-
A zero-shot framework for cross-project vulnerability detection in source code
-
DeepVulHunter: enhancing the code vulnerability detection capability of LLMs through multi-round analysis
-
Smart contract: a survey towards extortionate vulnerability detection and security enhancement
-
Correction to: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
-
Evolutionary Constraint-Based Testing Approach for Software Vulnerability Detection
-
Detection and Attribution of Spatiotemporal Trends of Climatic Disaster Mortality in Nepal
-
A Decentralized Solution for Sewer Leakage Detection – Eine dezentrale Lösung für die Leckageortung in der Kanalisation
-
ByteEye: A smart contract vulnerability detection framework at bytecode level with graph neural networks
-
Detection of Intrusions and Malware, and Vulnerability Assessment – 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
-
Detection of Intrusions and Malware, and Vulnerability Assessment – 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers
-
Information and Communications Security – 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings
-
Detection of Intrusions and Malware, and Vulnerability Assessment – 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings
-
Detection of Intrusions and Malware, and Vulnerability Assessment – 7th International Conference, DIMVA 2010, Bonn, Germany, July 8-9, 2010. Proceedings
-
GTVD: a multi-level aggregation vulnerability detection method based on full-dependency program graph