Journal articles on the topic 'False Positives and Static Topology'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'False Positives and Static Topology.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
V., P. Krishna Anne*1 &. Dr. K. Rajasekhara Rao2. "ADVANCED IMPLEMENTATION OF ENHANCED AODV TO DETECT PASSIVE BASED INTRUSION DETECTION ATTACKS IN WIRELESS AD HOC NETWORKS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 168–76. https://doi.org/10.5281/zenodo.823076.
Full textYousefi-Azar, Mahmood, Len Hamey, Vijay Varadharajan, and Shiping Chen. "Byte2vec: Malware Representation and Feature Selection for Android." Computer Journal 63, no. 8 (2019): 1125–38. http://dx.doi.org/10.1093/comjnl/bxz121.
Full textPark, Jihyun, Jaeyoung Shin, and Byoungju Choi. "Reduction of False Positives for Runtime Errors in C/C++ Software: A Comparative Study." Electronics 12, no. 16 (2023): 3518. http://dx.doi.org/10.3390/electronics12163518.
Full textSivaraman, Hariprasad. "Adaptive Thresholding in ML-Driven Alerting Systems for Reducing False Positives in Production Environment." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–6. https://doi.org/10.55041/ijsrem11938.
Full textGunda Brahma Sagara. "Hybrid Deep Learning Framework for Real-Time Source Code Vulnerability Detection." Communications on Applied Nonlinear Analysis 32, no. 7s (2025): 889–900. https://doi.org/10.52783/cana.v32.3493.
Full textDong, Yukun, Mengying Wu, Shanchen Pang, et al. "Automated Program-Semantic Defect Repair and False-Positive Elimination without Side Effects." Symmetry 12, no. 12 (2020): 2076. http://dx.doi.org/10.3390/sym12122076.
Full textMateo Tudela, Francesc, Juan-Ramón Bermejo Higuera, Javier Bermejo Higuera, Juan-Antonio Sicilia Montalvo, and Michael I. Argyros. "On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications." Applied Sciences 10, no. 24 (2020): 9119. http://dx.doi.org/10.3390/app10249119.
Full textTiganov, Daniil, Lisa Nguyen Quang Do, and Karim Ali. "Designing UIs for Static Analysis Tools." Queue 19, no. 4 (2021): 97–118. http://dx.doi.org/10.1145/3487019.3487026.
Full textLI, MIN, JIAN-XIN WANG, HUAN WANG, and YI PAN. "IDENTIFICATION OF ESSENTIAL PROTEINS FROM WEIGHTED PROTEIN–PROTEIN INTERACTION NETWORKS." Journal of Bioinformatics and Computational Biology 11, no. 03 (2013): 1341002. http://dx.doi.org/10.1142/s0219720013410023.
Full textAmit Singh, Et al. "?Implementation of Security Protocol for Intrusion Detection Systems in Wireless Sensor Networks." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2024): 3240–43. http://dx.doi.org/10.17762/ijritcc.v11i9.9515.
Full textJi, Yuchen, Ting Dai, Zhichao Zhou, Yutian Tang, and Jingzhu He. "Artemis: Toward Accurate Detection of Server-Side Request Forgeries through LLM-Assisted Inter-procedural Path-Sensitive Taint Analysis." Proceedings of the ACM on Programming Languages 9, OOPSLA1 (2025): 1349–77. https://doi.org/10.1145/3720488.
Full textOleksandr, Popov, Shmatko Nataliia, Budanov Pavlo, Pantielieieva Iryna, and Brovko Kostiantyn. "COSTEFFECTIVENESS IN MATHEMATICAL MODELLING OF THE POWER UNIT CONTROL." Eastern-European Journal of Enterprise Technologies 6, no. 3 (102) (2019): 39–48. https://doi.org/10.15587/1729-4061.2019.183422.
Full textBorodin, Alexey Evgenevich, Alexey Vyacheslavovich Goremykin, Sergey Pavlovitch Vartanov, and Andrey Andreevich Belevantsev. "Searching for tainted vulnerabilities in static analysis tool Svace." Proceedings of the Institute for System Programming of the RAS 33, no. 1 (2021): 7–32. http://dx.doi.org/10.15514/ispras-2021-33(1)-1.
Full textHe, Weigang, Peng Di, Mengli Ming, et al. "Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles." Proceedings of the ACM on Software Engineering 1, FSE (2024): 1656–78. http://dx.doi.org/10.1145/3660781.
Full textTan, Yaodan, and Junfeng Tian. "A Method for Processing Static Analysis Alarms Based on Deep Learning." Applied Sciences 14, no. 13 (2024): 5542. http://dx.doi.org/10.3390/app14135542.
Full textMarques, Filipe, Mafalda Ferreira, André Nascimento, et al. "Automated Exploit Generation for Node.js Packages." Proceedings of the ACM on Programming Languages 9, PLDI (2025): 1341–66. https://doi.org/10.1145/3729304.
Full textCao, Buwen, Jiawei Luo, Cheng Liang, and Shulin Wang. "Identifying Protein Complexes by Combining Network Topology and Biological Characteristics." Journal of Computational and Theoretical Nanoscience 13, no. 10 (2016): 7666–75. http://dx.doi.org/10.1166/jctn.2016.6084.
Full textMandel, Nicolas, Nils Kompe, Moritz Gerwin, and Floris Ernst. "KISS—Keep It Static SLAMMOT—The Cost of Integrating Moving Object Tracking into an EKF-SLAM Algorithm." Sensors 24, no. 17 (2024): 5764. http://dx.doi.org/10.3390/s24175764.
Full textJabbar, Haidar, and Samir Al-Janabi. "AI-Driven Phishing Detection: Enhancing Cybersecurity with Reinforcement Learning." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 26. https://doi.org/10.3390/jcp5020026.
Full textTian, Jie, Ming Yu Luo, and Meng Yang Chen. "A New Type of Hexagonal Fault-Tolerant Clustering Algorithm." Applied Mechanics and Materials 543-547 (March 2014): 1728–33. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.1728.
Full textSandhya, Guduru. "Web3 Smart Contract Security: Slither Static Analysis, Echidna Fuzzing, and Certora Formal Verification." European Journal of Advances in Engineering and Technology 11, no. 5 (2024): 147–50. https://doi.org/10.5281/zenodo.15387253.
Full textBrotzman, Robert, Danfeng Zhang, Mahmut Taylan Kandemir, and Gang Tan. "SpecSafe: detecting cache side channels in a speculative world." Proceedings of the ACM on Programming Languages 5, OOPSLA (2021): 1–28. http://dx.doi.org/10.1145/3485506.
Full textBierhoff, Kevin. "Wildcards need witness protection." Proceedings of the ACM on Programming Languages 6, OOPSLA2 (2022): 373–94. http://dx.doi.org/10.1145/3563301.
Full textShimchik, Nikita Vladimirovich, Valery Nikolayevich Ignatyev, and Andrey Andreevich Belevantsev. "Irbis: static taint analyzer for vulnerabilities detection in C/C++." Proceedings of the Institute for System Programming of the RAS 34, no. 6 (2022): 51–66. http://dx.doi.org/10.15514/ispras-2022-34(6)-4.
Full textRehana Sultana Khan. "AI-Based Rate Limiting for Cloud Infrastructure: Implementation Guide." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 370–80. https://doi.org/10.32996/jcsts.2025.7.3.43.
Full textYang, Gang, Chaojing Tang, and Xingtong Liu. "DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective." Symmetry 14, no. 10 (2022): 2138. http://dx.doi.org/10.3390/sym14102138.
Full textAtmaja, Devi Yulianty Surya, and Achmad Samsudin. "Are There Misconceptions in My Class? Misconception Analysis with T3-SF (Three Tier-Test on Static Fluid)." Tarbiyah : Jurnal Ilmiah Kependidikan 13, no. 2 (2024): 155–70. https://doi.org/10.18592/tarbiyah.v13i2.13518.
Full textNaseer, Atif, and Enrique Nava. "Counting of Underwater Static Objects Through an Efficient Temporal Technique." Journal of Marine Science and Engineering 13, no. 2 (2025): 205. https://doi.org/10.3390/jmse13020205.
Full textOkebule, T., O. A. Adeyemo, K. A. Olatunji, and A. S. Awe. "Content Analyzer for Information Leakage Detedction and Prevention in Android Smart Devices: A Conceptual Approach." advances in multidisciplinary & scientific research journal publication 6, no. 1 (2020): 72–90. http://dx.doi.org/10.22624/aims/v6n1p7.
Full textGupta, Brij B., Pooja Chaudhary, and Shashank Gupta. "Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure." Journal of Organizational and End User Computing 32, no. 4 (2020): 85–111. http://dx.doi.org/10.4018/joeuc.2020100105.
Full textAnub, A., and S. Sreelekshmy. "Dynamic Threshold-Based Algorithm for Client-Based HTTP Proxy Attack Detection through Spatial and Temporal Behavior Pattern Analysis." Recent Trends in Androids and IOS Applications 6, no. 3 (2024): 48–53. https://doi.org/10.5281/zenodo.13626561.
Full textKalsey, Kiratpal Singh. "Vulnerability and Malware Detection." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 113–18. http://dx.doi.org/10.22214/ijraset.2024.64807.
Full textWadne, Vinod. "MOBILE BOTNET DETECTION: A Machine Learning Approach using SVM." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2292–96. https://doi.org/10.22214/ijraset.2025.67807.
Full textWadne, Vinode. "Mobile BOTNET Detection: A Machine Learning Approach using SVM." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 1314–19. https://doi.org/10.22214/ijraset.2025.72385.
Full textLi, Jinfeng. "Vulnerabilities Mapping based on OWASP-SANS: A Survey for Static Application Security Testing (SAST)." Annals of Emerging Technologies in Computing 4, no. 3 (2020): 1–8. http://dx.doi.org/10.33166/aetic.2020.03.001.
Full textElrowayati, Ali, and Ammar Fadeel. "SAST Tools and Manual Testing to Improve the Methodology of Vulnerability Detection in Web Applications." International Journal of Engineering & Information Technology (IJEIT) 12, no. 1 (2024): 79–83. http://dx.doi.org/10.36602/ijeit.v12i1.480.
Full textUmar, Kabir, Abu Bakar Sultan, Hazura Zulzalil, Novia Admodisastro, and Mohd Taufik Abdullah. "Comparing Web Vulnerability Scanners with a New Method for SQL Injection Vulnerabilities Detection and Removal EPSQLiFix." International Journal of Engineering & Technology 7, no. 4.31 (2018): 40–45. http://dx.doi.org/10.14419/ijet.v7i4.31.23338.
Full textAyyarrappan, Mariappan. "AI for Automated Code Reviews and Quality Assurance." International Scientific Journal of Engineering and Management 03, no. 11 (2024): 1–9. https://doi.org/10.55041/isjem02159.
Full textOnyedinma, Ebele G, Asogwa Doris C, and Onyenwe, Ikechukwu E. "Towards resilient malware detection: A hybrid framework leveraging static-dynamic features and ensemble models." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 634–39. https://doi.org/10.30574/wjaets.2025.15.3.0901.
Full textHu, Huimin, Yingying Wang, Julia Rubin, and Michael Pradel. "An Empirical Study of Suppressed Static Analysis Warnings." Proceedings of the ACM on Software Engineering 2, FSE (2025): 290–311. https://doi.org/10.1145/3715729.
Full textOlabode, Olanrewaju O., and Adebola K. Ojo. "Enhancing the Detection of Debit Card Fraud Detection Using Logistic Regression and Random Forest Techniques." Journal of Advances in Mathematics and Computer Science 39, no. 10 (2024): 74–83. http://dx.doi.org/10.9734/jamcs/2024/v39i101936.
Full textSun, Hao, Chao Su, Yue Wang, and Qingkai Zeng. "Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis." International Journal of Software Engineering and Knowledge Engineering 25, no. 09n10 (2015): 1573–93. http://dx.doi.org/10.1142/s0218194015400331.
Full textYenti, Sekar Olivia, Maison Maison, and Syaiful Syaiful. "Diagnosis Miskonsepsi Siswa MAN Insan Cendekia Jambi Pada Materi Fluida Statis dan Fluida Dinamis." Edu-Sains: Jurnal Pendidikan Matematika dan Ilmu Pengetahuan Alam 10, no. 1 (2022): 13–18. http://dx.doi.org/10.22437/jmpmipa.v10i1.20695.
Full textNandeesha H D, Prasanna B T. "Optimized Data Processing and Genetic Algorithm based Feature Selection Method to Detect URL Phishing Attacks Using Reinforcement Learning." Journal of Information Systems Engineering and Management 10, no. 18s (2025): 204–12. https://doi.org/10.52783/jisem.v10i18s.2904.
Full textMuske, Tukaram, and Alexander Serebrenik. "Survey of Approaches for Postprocessing of Static Analysis Alarms." ACM Computing Surveys 55, no. 3 (2023): 1–39. http://dx.doi.org/10.1145/3494521.
Full textDr., Suman Thapaliya, and Ravi Chandra Gurung Mr. "Mitigating Insider Threats and Data Breaches: Enhancing Data Loss Prevention Systems with Behavioral Analytics And NLP." International Journal of Multidisciplinary and Innovative Research 02, no. 01 (2025): 22–27. https://doi.org/10.5281/zenodo.14634504.
Full textRamaswamy, Mithilesh. "Early Detection of Hard-Coded Secrets in Software Development: A Multi-Method Approach Integrating Static Analysis, Entropy-Based Detection, and Machine Learning." International Scientific Journal of Engineering and Management 03, no. 12 (2024): 1–6. https://doi.org/10.55041/isjem0411.
Full textMaddula, Sai Sirisha. "Evaluating Current Techniques for Detecting Vulnerabilities in Ethereum Smart Contracts." Engineering International 11, no. 1 (2023): 59–72. http://dx.doi.org/10.18034/ei.v11i1.717.
Full textLi, Kaixuan, Yue Xue, Sen Chen, et al. "Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?" Proceedings of the ACM on Software Engineering 1, FSE (2024): 1447–70. http://dx.doi.org/10.1145/3660772.
Full textJin, Lin, Shuai Hao, Haining Wang, and Chase Cotton. "Understanding the Practices of Global Censorship through Accurate, End-to-End Measurements." ACM SIGMETRICS Performance Evaluation Review 50, no. 1 (2022): 17–18. http://dx.doi.org/10.1145/3547353.3522640.
Full text