Academic literature on the topic 'Vulnerability detection system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vulnerability detection system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Vulnerability detection system"

1

Le Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.

Full text
Abstract:
<p>As the core component of Android framework, Android system services provide a large number of basic and core function services for Android system. It has a lot of resources and very high system permissions. And for the Android system, it is a very important attack surface. Attackers can use Android system service vulnerabilities to steal user privacy, cause Android applications or Android system denial of service, remote malicious code execution and other malicious behaviors, which will seriously affect the security of Android users. Based on fuzzy testing technology, this paper designed and implemented a vulnerability mining system for Android system services, optimized and improved the fuzzy testing method, so as to improve the speed and effectiveness of vulnerability mining, and timely submitted the discovered vulnerabilities to the corresponding manufacturers and security agencies, to help Android manufacturers repair the vulnerabilities in time. The main work of this paper is as follows: Aiming at the null pointer reference vulnerability of Android system services, we designed and implemented an automatic fast mining system FASSFuzzer. FASSFuzzer uses ADB to quickly detect null pointer reference vulnerabilities in Android services. At the same time, FASSFuzzer added automatic design to automatically perceive the generation of vulnerabilities and ensure the full automation of the whole vulnerability mining process, and automatically generate a vulnerability mining report after the completion of vulnerability mining.</p> <p> </p>
APA, Harvard, Vancouver, ISO, and other styles
2

Le Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.

Full text
Abstract:
<p>As the core component of Android framework, Android system services provide a large number of basic and core function services for Android system. It has a lot of resources and very high system permissions. And for the Android system, it is a very important attack surface. Attackers can use Android system service vulnerabilities to steal user privacy, cause Android applications or Android system denial of service, remote malicious code execution and other malicious behaviors, which will seriously affect the security of Android users. Based on fuzzy testing technology, this paper designed and implemented a vulnerability mining system for Android system services, optimized and improved the fuzzy testing method, so as to improve the speed and effectiveness of vulnerability mining, and timely submitted the discovered vulnerabilities to the corresponding manufacturers and security agencies, to help Android manufacturers repair the vulnerabilities in time. The main work of this paper is as follows: Aiming at the null pointer reference vulnerability of Android system services, we designed and implemented an automatic fast mining system FASSFuzzer. FASSFuzzer uses ADB to quickly detect null pointer reference vulnerabilities in Android services. At the same time, FASSFuzzer added automatic design to automatically perceive the generation of vulnerabilities and ensure the full automation of the whole vulnerability mining process, and automatically generate a vulnerability mining report after the completion of vulnerability mining.</p> <p> </p>
APA, Harvard, Vancouver, ISO, and other styles
3

Luo, Fucai, Jingyi Xie, Jingdong Guo, Wenliang Liu, Jindong He, and Hang Zhang. "Vulnerability Detection System for Power Information Based on Network Traffic Identification Technology." Journal of Physics: Conference Series 2401, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2401/1/012042.

Full text
Abstract:
Abstract A power information vulnerability detection system has the problem of a low network survival rate. Therefore, a power information vulnerability detection system based on network traffic identification technology is designed. In the hardware part, the memory is configured as a synchronous interface and 4 DRAMs, and the level input and output power of the chip are kept in a state compatible with LVTTL levels; in the software part, the power information network indicators are obtained, the importance of network elements is reflected through a mesoscope, the failure characteristics of components are extracted using network traffic identification technology, a critical area is delineated, and the port protocols and association libraries of the passages are matched to optimize the system vulnerability detection function. Through analysis of the simulation results, it can be obtained that the network survival rate of the power information vulnerability detection system in this paper is 17.657% and 17.931% higher than that obtained by the other two power information vulnerability detection systems, respectively, indicating that the designed power information vulnerability detection system is more effective when fully integrated with network traffic identification techniques.
APA, Harvard, Vancouver, ISO, and other styles
4

Shiraishi, M., Y. Fujinuma, T. Ishikawa, K. Ishige, and H. Doki. "An Ultrasonic Double-Sheet Detection System for Collators." Journal of Engineering for Industry 114, no. 4 (1992): 489–93. http://dx.doi.org/10.1115/1.2900702.

Full text
Abstract:
A new ultrasonic method of detecting double sheets in collators has been developed that overcomes several shortcomings of conventional detection techniques. An air curtain efficiently reduces the ultrasonic detector’s vulnerability to ambient temperature fluctuations. The accuracy of detection is enhanced by utilizing the low-level component of the received ultrasonic signal. A gain adjustment technique is introduced which enables detection for a wide range of paper stocks using a single threshold level.
APA, Harvard, Vancouver, ISO, and other styles
5

Hou, Jin-bing, Tong Li, and Cheng Chang. "Research for Vulnerability Detection of Embedded System Firmware." Procedia Computer Science 107 (2017): 814–18. http://dx.doi.org/10.1016/j.procs.2017.03.181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jeo John, Precious, and Sumit Surendran. "Vulnerabilities Detection by Matching with known Vulnerabilities." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28422.

Full text
Abstract:
Vulnerability Matcher is a tool designed to identify and prioritize security vulnerabilities in software systems. This intelligent system leverages advanced machine learning algorithms to analyze and match identified vulnerabilities with known security threats and exploits. The primary function of Vulnerability Matcher is to provide developers and security professionals with a comprehensive understanding of the security risks associated with their software. It does this by scanning the codebase and identifying potential security vulnerabilities that could be exploited by malicious actors. Vulnerability Matcher's speciality is its ability to prioritize identified vulnerabilities. By using machine learning techniques, it can determine which vulnerabilities pose the greatest risk and should be addressed first. This prioritization is based on factors such as the severity of the vulnerability, the likelihood of exploitation, and the potential impact on the system. In addition to identifying and prioritizing vulnerabilities, Vulnerability Matcher also provides actionable recommendations on how to remediate each vulnerability. These recommendations are tailored to the specific vulnerability and can range from simple code changes to more complex system modifications. Moreover, Vulnerability Matcher is continuously learning and improving. It uses feedback from its users to refine its algorithms and improve its accuracy. This continuous learning process ensures that Vulnerability Matcher remains up-to-date with the latest security threats and can provide the most accurate and effective vulnerability matching and prioritization. Vulnerability Matcher is a highly effective tool for managing security vulnerabilities in software systems. It uses advanced AI and machine learning techniques to identify, prioritize, and provide actionable recommendations for remediation of vulnerabilities. This tool is invaluable for developers and security professionals who want to ensure the security of their software systems.
APA, Harvard, Vancouver, ISO, and other styles
7

Kalyan Manohar, Immadisetti, Dadisetti Vishnu Datta, and Lekshmi S. Raveendran. "Website Vulnerability Scanning System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43079.

Full text
Abstract:
With the increasing reliance on web applications for business and personal use, ensuring website security has become a critical concern. Cyber threats such as SQL injection, cross-site scripting (XSS), malware infections, and unauthorized access pose significant risks to websites, leading to data breaches and service disruptions. This project aims to develop a comprehensive website security scanner that systematically identifies vulnerabilities and potential security risks.The proposed system integrates automated vulnerability scanning, penetration testing techniques, and real-time monitoring to detect security loopholes. Using machine learning and heuristic-based analysis, the scanner can identify malicious scripts, outdated software versions, weak authentication mechanisms, and misconfigured security policies. The system also performs network security assessments, analyzing potential DDoS (Distributed Denial-of-Service) attack risks and firewall configurations. The scanner generates detailed security reports, providing actionable insights and recommendations for website owners and administrators to mitigate risks effectively. Designed for continuous monitoring and proactive defense, the tool enhances cybersecurity resilience against evolving threats. This project contributes to web security advancements by offering an intelligent, automated, and scalable solution for safeguarding websites from cyberattacks. Keywords: Website Security | Vulnerability Scanner | Cyber Threats | SQL Injection | Cross-Site Scripting (XSS) | Penetration Testing | Machine Learning | Malware Detection | DDoS Protection | Authentication Security | Firewall Analysis | Web Application Security | Risk Assessment | Cybersecurity Resilience
APA, Harvard, Vancouver, ISO, and other styles
8

Azhari, Firman. "Quick detection of NFC vulnerability." Information Management & Computer Security 22, no. 2 (2014): 134–40. http://dx.doi.org/10.1108/imcs-09-2013-0067.

Full text
Abstract:
Purpose – The purpose of this research is to explain particular implementation weaknesses of near field communication (NFC) systems done by several institutions which apply for critical purposes and provide practical solutions. Design/methodology/approach – This research is done by literature studies of previous findings in NFC security, observations of some existing implemented systems and experimentations to provide practical solutions. Findings – Unintentional lack of security protection of the NFC cards and tags by some card issuers make them a vulnerable target. The outcomes of this research are proposed solutions on methods to quickly detect vulnerability in NFC tags using an Android-based mobile application. Another solution involves the assembly of a detection device using the portable, low power and powerful Raspberry Pi to analyze the NFC tags or cards and NFC reader vulnerabilities. Research limitations/implications – This research is conducted in Indonesia; therefore, the results and solutions may lack generalizability. However, the findings may occur in other countries which newly apply NFC technology. Practical implications – System implementer should become more aware about the security issue of old NFC tags like MIFARE Classic. Price should be considered after tag security. People also need to be aware of identity or money theft using NFC-enabled smartphones, as many identity cards and electronic money are now relying on NFC technology. Social implications – People also need to be aware of identity or money theft using NFC-enabled smartphones, as many identity cards and electronic money are now relying on NFC technology. Originality/value – This research fulfills an identified need to evaluate the security aspect of a system that uses NFC as one of the main technologies. The results and solutions also provides cheap, easy and practical tools to analyze NFC security.
APA, Harvard, Vancouver, ISO, and other styles
9

Guo, Ran, Weijie Chen, Lejun Zhang, Guopeng Wang, and Huiling Chen. "Smart Contract Vulnerability Detection Model Based on Siamese Network (SCVSN): A Case Study of Reentrancy Vulnerability." Energies 15, no. 24 (2022): 9642. http://dx.doi.org/10.3390/en15249642.

Full text
Abstract:
Blockchain technology is currently evolving rapidly, and smart contracts are the hallmark of the second generation of blockchains. Currently, smart contracts are gradually being used in power system networks to build a decentralized energy system. Security is very important to power systems and attacks launched against smart contract vulnerabilities occur frequently, seriously affecting the development of the smart contract ecosystem. Current smart contract vulnerability detection tools suffer from low correct rates and high false positive rates, which cannot meet current needs. Therefore, we propose a smart contract vulnerability detection system based on the Siamese network in this paper. We improved the original Siamese network model to perform smart contract vulnerability detection by comparing the similarity of two sub networks with the same structure and shared parameters. We also demonstrate, through extensive experiments, that the model has better vulnerability detection performance and lower false alarm rate compared with previous research results.
APA, Harvard, Vancouver, ISO, and other styles
10

Sun, Meng, Qi Wang, Jue He, et al. "Research on automatic scanning method of network vulnerabilities in power system." Journal of Physics: Conference Series 2290, no. 1 (2022): 012036. http://dx.doi.org/10.1088/1742-6596/2290/1/012036.

Full text
Abstract:
Abstract Power system network is an important guarantee for the smooth operation of power enterprises. Considering the current automatic network vulnerability scanning method of power system, the detection rate of network vulnerability scanning is low due to its poor scheduling ability. Therefore, this paper designs a new automatic scanning method for network vulnerabilities in power system. According to the infrastructure of power system network vulnerability scanner, the power system web page interaction behavior recognition model is constructed to complete the power system web page interaction behavior recognition. On this basis, the power system network scanning scheduling algorithm is designed. Combined with genetic algorithm, the variation process of power system network vulnerabilities is determined, the power system network security situation is determined, the power system network scanning scheduling and vulnerability mining are realized, and the design of power system network leakage automatic scanning method is completed. The experimental link is constructed to verify this method. The verification shows that this method can effectively improve the detection rate of network vulnerability scanning and the efficiency of vulnerability scanning to a certain extent.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Vulnerability detection system"

1

Hou, Haiyu Dozier Gerry V. "GENERTIA a system for vulnerability analysis, design and redesign of immunity-based anomaly detection system /." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Fall/Dissertations/HOU_HAIYU_22.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Munir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.

Full text
Abstract:
Cisco 2014 Annual Security Report clearly outlines the evolution of the threat landscape and the increase of the number of attacks. The UK government in 2012 recognised the cyber threat as Tier-1 threat since about 50 government departments have been either subjected to an attack or a direct threat from an attack. The cyberspace has become the platform of choice for businesses, schools, universities, colleges, hospitals and other sectors for business activities. One of the major problems identified by the Department of Homeland Security is the lack of clear security metrics. The recent cyber security breach of the US retail giant TARGET is a typical example that demonstrates the weaknesses of qualitative security, also considered by some security experts as fuzzy security. High, medium or low as measures of security levels do not give a quantitative representation of the network security level of a company. In this thesis, a method is developed to quantify the security risk level of known and unknown attacks in an enterprise network in an effort to solve this problem. The identified vulnerabilities in a case study of a UK based company are classified according to their severity risk levels using common vulnerability scoring system (CVSS) and open web application security project (OWASP). Probability theory is applied against known attacks to create the security metrics and, detection and prevention method is suggested for company network against unknown attacks. Our security metrics are clear and repeatable that can be verified scientifically.
APA, Harvard, Vancouver, ISO, and other styles
3

Bughio, Kulsoom Saima. "IoMT security: A semantic framework for vulnerability detection in remote patient monitoring." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2841.

Full text
Abstract:
The increasing need to safeguard patient data in Internet of Medical Things (IoMT) devices highlights the critical importance of reducing vulnerabilities within these systems. The widespread adoption of IoMT has transformed healthcare by enabling continuous remote patient monitoring (RPM), which enhances patient outcomes and optimizes healthcare delivery. However, the integration of IoMT devices into healthcare systems presents significant security challenges, particularly in protecting sensitive patient data and ensuring the reliability of medical devices. The diversity of data formats used by various vendors in RPM complicates data aggregation and fusion, thereby hindering overall cybersecurity efforts. This thesis proposes a novel semantic framework for vulnerability detection in RPM settings within the IoMT system. The framework addresses interoperability, heterogeneity, and integration challenges through meaningful data aggregation. The core of this framework is a domain ontology that captures the semantics of concepts and properties related to the primary security aspects of IoT medical devices. This ontology is supported by a comprehensive ruleset and complex queries over aggregated knowledge. Additionally, the implementation integrates medical device data with the National Vulnerability Database (NVD) via an API, enabling real-time detection of vulnerabilities and improving the security of RPM systems. By capturing the semantics of medical devices and network components, the proposed semantic model facilitates partial automation in detecting network anomalies and vulnerabilities. A logic-based ruleset enhances the system’s robustness and efficiency, while its reasoning capabilities enable the identification of potential vulnerabilities and anomalies in IoMT systems, thereby improving security measures in remote monitoring settings. The semantic framework also supports knowledge graph visualization and efficient querying through SPARQL. The knowledge graph provides a structured representation of interconnected data and stores Cyber Threat Intelligence (CTI) to enhance data integration, visualization, and semantic enrichment. The query mechanism enables healthcare providers to extract valuable insights from IoMT data, notifying them about new system vulnerabilities or vulnerable medical devices. This demonstrates the impact of vulnerabilities on cybersecurity requirements (Confidentiality, Integrity, and Availability) and facilitates countermeasures based on severity. Consequently, the framework promotes timely decision-making, enhancing the overall efficiency and effectiveness of IoMT systems. The semantic framework is validated through various use cases and existing frameworks, demonstrating its effectiveness and robustness in vulnerability detection within the domain of IoMT security.
APA, Harvard, Vancouver, ISO, and other styles
4

Яцентюк, Святослав Сергійович, та Sviatoslav Yatsentiuk. "Розробка та дослідження автоматизованої системи виявлення вразливостей розподілених комп'ютерних систем". Master's thesis, Тернопіль, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36532.

Full text
Abstract:
Роботу виконано на кафедрі ком’пютерно-інтегрованих технологій Тернопільського національного технічного університету імені Івана Пулюя Міністерства освіти і науки України Захист відбудеться 21 грудня 2021 р. о 09 .00 годині на засіданні екзаменаційної комісії № 24 у Тернопільському національному технічному університеті імені Івана Пулюя за адресою: 46001, м. Тернопіль, вул.Руська, 56, навчальний корпус №1, ауд. 403<br>Кваліфікаційна робота складається з пояснювальної записки та графічної частини (ілюстративний матеріал – слайди). Об’єм графічної частини кваліфікаційної роботи становить 10 слайдів. Об’єм пояснювальної записки складає 64 друкованих сторінок формату А4 (210×297), об’єм додатків – 14 друкованих сторінок формату А4. Кваліфікаційна робота складається з шести розділів, в яких нараховується 10 рисунків та 3 таблиці з даними. В роботі використано 20 літературних джерел. У кваліфікаційній роботі вирішується задача розробки та впровадження розподіленої служби, призначеної для накопичення та аналізування використання ресурсів обчислювальних вузлів, їх активних процесів, виконання розподілених прикладних програм, з метою виявлення відхилень у їх роботі та інформування користувача про нештатні ситуації. Основні вимоги, які висуваються до цієї служби полягають у здійсненні кластерного моніторингу та аналізу використання ресурсів.Qualification work consists of an explanatory note and a graphic part (illustrative material - slides). The graphic part of the qualifying work is 10 slides. The volume of the explanatory note is 64 printed A4 pages (210 × 297), the volume of appendices is 10 printed A4 pages. The qualification work consists of six sections, in which there are 15 figures and 3 tables with data. 20 literary sources were used in the work. Qualification work solves the problem of developing and implementing a distributed service designed to accumulate and analyze the use of resources of computer nodes, their active processes, the implementation of distributed applications, to identify deviations in their work and inform the user about abnormal situations. The main requirements for this service are cluster monitoring and analysis of resource use.<br>ПЕРЕЛІК УМОВНИХ ПОЗНАЧЕНЬ, ОДИНИЦЬ, СИМВОЛІВ, СКОРОЧЕНЬ І ТЕРМІНІВ 6 ВСТУП 7 1 АНАЛІЗ АРХІТЕКТУРИ РОЗПОДІЛЕНИХ СИСТЕМ І АРХІТЕКТУРНИХ СТИЛІВ 9 1.1 Розподілена система 9 1.2 Архітектури розподілених систем 9 1.3 Архітектурні стилі 10 1.3.1 Багатошарова архітектура 10 1.3.2 Архітектура на основі об'єктів 10 1.3.3 Архітектура, орієнтована на дані 11 1.3.4 Архітектура на основі подій 11 1.4 Вимоги до розподілених систем 12 1.5 Проміжне середовище розподілених систем 14 2 АНАЛІЗ ЗАГРОЗ ІНФОРМАЦІЙНІЙ БЕЗПЕЦІ В РОЗПОДІЛЕНИХ СИСТЕМАХ 16 2.1 Технології розвитку вразливостей і загроз 16 2.2 Модель загроз у розподілених мережах 17 2.3 Вразливість до шахрайства 18 2.4 Проблеми дослідження вразливості 19 2.5 Несанкціонований доступ у розподілених мережах. Механізми його реалізації 21 3 ДОСЛІДЖЕННЯ МЕХАНІЗМІВ ЗМЕНШЕННЯ ВРАЗЛИВОСТІ ТА ЗАГРОЗ 27 3.2 Фізична безпека в розподіленій системі 28 3.3 Безпека мережі та політика аутентифікації 29 3.4 Розробка механізмів захисту 30 3.4.1. Фокус керування 31 3.4.2. Багаторівнева організація механізмів захисту 31 3.4.3. Розподіл механізмів захисту 32 3.5 Захищені канали 33 3.6 Контроль доступу 34 4 НАУКОВО-ДОСЛІДНА ЧАСТИНА 35 4.1 Дослідження існуючих способів побудови 35 4.2 Кластерний моніторинг 37 4.2.1 Загальна характеристика моніторингу кластерів 37 4.2.2 Способи автоматизування виявлення несправностей 40 4.2.3 Альтернативні структури моніторингу 40 5 СПЕЦІАЛЬНА ЧАСТИНА 42 5.1 Архітектура і дизайн розробленої системи 42 5.1.1 Принцип роботи колектора 42 5.1.2 Опис роботи механізму аналізу 44 5.2 Реалізація системи 46 5.2.1 Запобігання помилок при роботі з колектором 47 5.2.2 Передача даних для аналізу та зберігання 48 5.3 Експерементальна частина 48 5.3.1 Опис експериментальної установки 48 5.3.2 Використання пам’яті колектора 49 5.3.3 Хід аналізу 49 5.3.5 Експеременти з виявленням вразливостей 50 5.4 Отримані результати 51 5.4.1 Вимірювання колектора 51 5.4.2 Результати продуктивності аналізу 51 5.4.3 Аналіз даних 54 5.4.4 Результати виявлення відхилень 55 6 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ 56 6.1 Безпека виконання робіт 56 6.2 Значення автоматизації виробничих процесів в питаннях охорони праці 56 6.3 Долікарська допомога при пораненнях 57 ВИСНОВКИ 60 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ 61 ДОДАТКИ
APA, Harvard, Vancouver, ISO, and other styles
5

Gabelli, Filippo. "Security analysis of physical attacks to offshore O&G facilities." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
Chemical and petrochemical plants are susceptible to malicious acts due to the attractiveness brought by the substances handled, the possibility to thieve secret information, and their strategic importance. Thus, a number of qualitative and semi-quantitative methodologies have been developed for the assessment of vulnerabilities of such sites. Similarly, offshore facilities, that are central in the production of hydrocarbons, were subjected to physical and cyber security events as is outlined in relevant past accident analysis. However, there are just few methodologies tailored for the identification of vulnerabilities in that specific environment. The current study is aimed at closing such gap by building a proper technique for modeling attacks towards offshore sites. The method has been developed just for physical attacks and has been drafted with reference to the ASD model, for rendering the adversary pattern, and to the single path computer model (EASI), for the estimation of the PPS effectiveness. The methodology is intended as a tool for supporting standard SVA/SRA procedures, with particular reference to the API RP 780, therefore its purpose is to provide a systematic approach to the analysis. It has been applied to a case study, represented by an offshore production platform, to point out the results obtained and to outline the link with the API SRA methodology.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Long. "Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/17846.

Full text
Abstract:
The future grid is different from the current system, and requires more interactions between electrical network and data communication network from the end users to generators. The electrical network acts as a power supply for communication nodes, and in turn, the communication network transmits the control messages for the electrical components. Because of this interdependency, any problems exist in either of these networks may threaten the stability of the whole system. We focus on analysing the vulnerability of the interacted power network and communication network from perspectives of topologies and system operation. An interdiction model is proposed considering the security and operation of both power and communication networks to recognise the crucial set of power components. We solve the interdiction problem using a decomposition method with the consideration of the interdependency between power and communication components. We propose a practical smart grid model as two mutually dependent complex networks with improved interlinks allocation strategy. Moreover, we study the problem of intentional attacks targeting to interdependent networks generated with known degree distribution or distribution of interlinks. In both models, each node's degree is correlated with the number of its links that connect to the other network. Detecting the community structure of a power network can effectively improve the availability of the control actions, which can enhance power system's resilience. This work proposes a method to group the power components into overlapping communities based on the linear sensitivity of the electrical network and complex network theory. This work provides a guidance for the design of the distributed power control system and the power system operation planning.
APA, Harvard, Vancouver, ISO, and other styles
7

Kasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques". Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.

Full text
Abstract:
Les outils de prévention des vulnérabilités et de détection des anomalies sont essentiels pour la sécurité des réseaux informatiques. Cette thèse se concentre sur l'utilisation des données du MITRE ATT&amp;CK, des scores CVSS et de la norme ISO 27002:2022 pour automatiser et consolider l'analyse des vulnérabilités et la détection des anomalies. Les objectifs principaux sont : - Diagnostic de vulnérabilité : Identifier les sous-réseaux les plus vulnérables en combinant les données du MITRE ATT&amp;CK, des scores CVSS et de la norme ISO 27002:2022. Pour cela, une base de données appelée Data ISO-MA a été créée. Un algorithme évalue la vulnérabilité des chemins dans le réseau, identifiant ceux les plus à risque. - Détection d’anomalies : Analyser les flux de trafic pour détecter des comportements inhabituels dans les chemins vulnérables. Une approche inspirée du modèle Path-scan de Joshua Neil et al. (2013) a été utilisée. Chaque connexion réseau est modélisée avec un modèle de Markov à 3 états et la statistique du rapport de vraisemblance généralisé (GLRT), permettant de capturer et d'identifier les comportements anormaux.Ces deux outils visent à renforcer la sécurité des réseaux informatiques en fournissant une solution intégrée pour la prévention des vulnérabilités et la détection des anomalies<br>Tools for vulnerability prevention and anomaly detection are essential for the security of computer networks. This thesis focuses on using MITRE ATT&amp;CK data, CVSS scores, and the ISO 27002:2022 standard to automate and consolidate vulnerability analysis and anomaly detection.The main objectives are: -Vulnerability Diagnosis: Identify the most vulnerable sub-networks by combining MITRE ATT&amp;CK data, CVSS scores, and the ISO 27002:2022 standard. To achieve this, a database called Data ISO-MA was created. An algorithm evaluates the vulnerability of network paths, identifying those most at risk. - Anomaly Detection: Analyze traffic flows to detect unusual behaviors in vulnerable paths. An approach inspired by the Path-scan model introduced by Joshua Neil et al. (2013) was used. Each network connection is modeled with a 3-state Markov model and the Generalized Likelihood Ratio Test (GLRT), allowing for the capture and identification of abnormal behaviors.These two tools aim to enhance the security of computer networks by providing an integrated solution for vulnerability prevention and anomaly detection
APA, Harvard, Vancouver, ISO, and other styles
8

Akrout, Rim. "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web." Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00782565.

Full text
Abstract:
Avec le développement croissant d'Internet, les applications Web sont devenues de plus en plus vulnérables et exposées à des attaques malveillantes pouvant porter atteinte à des propriétés essentielles telles que la confidentialité, l'intégrité ou la disponibilité des systèmes d'information. Pour faire face à ces malveillances, il est nécessaire de développer des mécanismes de protection et de test (pare feu, système de détection d'intrusion, scanner Web, etc.) qui soient efficaces. La question qui se pose est comment évaluer l'efficacité de tels mécanismes et quels moyens peut-on mettre en oeuvre pour analyser leur capacité à détecter correctement des attaques contre les applications web. Dans cette thèse nous proposons une nouvelle méthode, basée sur des techniques de clustering de pages Web, qui permet d'identifier les vulnérabilités à partir de l'analyse selon une approche boîte noire de l'application cible. Chaque vulnérabilité identifiée est réellement exploitée ce qui permet de s'assurer que la vulnérabilité identifiée ne correspond pas à un faux positif. L'approche proposée permet également de mettre en évidence différents scénarios d'attaque potentiels incluant l'exploitation de plusieurs vulnérabilités successives en tenant compte explicitement des dépendances entre les vulnérabilités. Nous nous sommes intéressés plus particulièrement aux vulnérabilités de type injection de code, par exemple les injections SQL. Cette méthode s'est concrétisée par la mise en oeuvre d'un nouveau scanner de vulnérabilités et a été validée expérimentalement sur plusieurs exemples d'applications vulnérables. Nous avons aussi développé une plateforme expérimentale intégrant le nouveau scanner de vulnérabilités, qui est destinée à évaluer l'efficacité de systèmes de détection d'intrusions pour des applicationsWeb dans un contexte qui soit représentatif des menaces auxquelles ces applications seront confrontées en opération. Cette plateforme intègre plusieurs outils qui ont été conçus pour automatiser le plus possible les campagnes d'évaluation. Cette plateforme a été utilisée en particulier pour évaluer deux techniques de détection d'intrusions développées par nos partenaires dans le cadre d'un projet de coopération financé par l'ANR, le projet DALI.
APA, Harvard, Vancouver, ISO, and other styles
9

Callaghan, Kerry Lee. "The use of remote sensing and GIS in the identification and vulnerability detection of coastal erosion as a hazard in False Bay, South Africa." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86611.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2014.<br>ENGLISH ABSTRACT: Coastal erosion is a worldwide hazard of which the consequences can only be mitigated via thorough and efficient monitoring of erosion and vulnerability to erosion. This study aimed to establish the accuracy, efficacy and efficiency of various remote sensing techniques for the detection and monitoring of coastal erosion and vulnerability occurring in False Bay, South Africa. There is a need to monitor the erosion in this area as well as to determine the most effective techniques for monitoring the erosion in False Bay and other similar environments in the future. This study provides an assessment of the usefulness of different data sources and techniques for change detection in the coastal environment. The data sources used were Landsat TM/ETM+ imagery and aerial photographs. Image differencing, tasselled cap transformations, vegetation index differencing, Boolean change detection, and post-classification change detection were all performed on the Landsat imagery. The aerial photographs were assessed using the Digital Shoreline Analysis System (DSAS) add-on for ArcGIS which determines statistical differences in the shoreline position as digitised in vector format. The results showed that while the resolution of the Landsat imagery was not sufficient to analyse erosion along the beach itself, the larger area covered by the satellite images enabled vulnerability indicators to be seen. Notably, the post-classification change detection indicated consistent increases in built-up areas, while sand dune, beach, and sand (not beach) all decreased. NDVI differencing showed consistent decreases in NDVI indicating decreasing plant health and density. The results of image differencing with both band 4 and the brightness band led to conclusions that vegetation health was decreasing while reflective surfaces such as bare sand and roads were increasing. All of these indicate an increased vulnerability to coastal erosion. The Boolean change detection method was found not to be useful in this case. Aerial photographs were studied on four focus areas: Bayview Heights, Macassar Beach, Strand, and Pringle Bay. The results showed erosion at all four areas, with Strand experiencing only erosion (no accretion) at an average of 53 cm erosion per year. Erosion at Macassar Beach and Pringle Bay was also severe, with Bayview Heights being the least severe and showing a combination of erosion and accretion. The higher resolution available on the aerial photographs was vital to view changes on the beach itself. In future studies requiring assessment of changes in the position or condition of the beach itself, aerial photographs or high resolution satellite data should be used. Studies of vulnerability extending over the entire coastal zone may make use of Landsat TM images. Post-classification change detection provides powerful change direction information and can indicate the percentage of area change from one class to another. However, image differencing and vegetation index differencing are much faster to perform and can provide information about general trends in the changes occurring. Therefore post-classification change detection might be used in areas of high and rapid change while image differencing and vegetation index differencing can be useful to cover vast areas where little change is expected.<br>AFRIKAANSE OPSOMMING: Kus-erosie is ‘n wêreldwye gevaar waarvan die gevolge slegs deur deeglike en doeltreffende monitering van erosie en kwesbaarheid vir erosie verminder kan word. Hierdie studie poog om die akkuraatheid, doeltreffendheid en effektiwiteit van verskillende afstandswaarneming tegnieke vas te stel vir die opsporing en monitering van kus-erosie en kwesbaarheid in Valsbaai, Suid Afrika. Daar is ‘n behoefte aan die monitering van erosie in hierdie area, sowel as om die mees doeltreffende tegnieke van die monitering hiervan in Valsbaai en ander soortgelyke omgewings in die toekoms te bepaal. Hierdie studie bied ‘n evaluering van die nut van verskillende data-bronne en tegnieke vir die opsporing van verandering in ‘n kusomgewing. Die data-bronne wat gebruik is, is Landsat TM/ETM+ beelde asook lugfoto’s. Beeld differensievorming, “tasselled cap” transformasies, plantegroei indeks differensievorming, Boolse verandering en post-klassifikasie verandering is toegepas op die Landsat beelde. Die lugfotos is ge-evalueer deur die Digitale Kuslyn Analise Stelsel (Digital Shoreline Analysis System – DSAS). DSAS is ‘n bykomstige sagteware vir ArcGIS wat statistiese verskille in gedigitaliseerde kuslyn posisie bepaal. Die resultate toon dat terwyl die resolusie van die Landsat beelde nie voldoende was om strand-erosie self te analiseer, die groter area wat deur die satellietbeelde gedek word toegelaat het om kwesbaarheid aanwysers te ontleed. Spesifiek die post-klassifikasie verandering het aangedui dat konsekwente toenames in beboude areas voorkom, terwyl afnames in sandduine, strand en sand-areas voorgekom het. NDVI differensievorming het konsekwente afnames in NDVI getoon, wat dui op afnames in die gesondheid en digtheid van plantegroei. Die resultate van die beeld differensievorming met beide Landsat Band 4 en die helderheid-band het gelei tot die gevolgtrekking dat die gesondheid van plantegroei afgeneem het, terwyl reflektiewe oppervlaktes soos oop sand en paaie aan die toeneem is. Al hierdie resultate dui op die verhoogde kwesbaarheid vir kus erosie. Die Boolse verandering metode is bevind om nie van nut te wees in hierdie geval nie. Lugfoto’s van vier fokus-areas is bestudeer: Bayview Heights, Macassar Strand, Strand en Pringlebaai. Resultate van die DSAS analise het gevind dat oorwegend erosie by al vier areas plaasvind, met Strand die enigste area wat slegs erosie (geen aanwas) ervaar teen ‘n gemiddelde koers van 0.53 m per jaar. Erosie by Macassar Strand en Pringlebaai was ook ernstig, terwyl Bayview Heights die minste erosie ervaar het, met ‘n kombinasie van erosie en aanwas. Die hoër resolusie beskikbaar deur die lugfoto’s was noodsaaklik om veranderinge in strand areas waar te neem. In toekomstige studies wat die assessering van verandering in die posisie of toestand van strande noodsaak behoort lugfotos of hoë-resolusie satellietbeeld data gebruik te word. Studies oor die kwesbaarheid van ‘n hele kusstreek kan wel gebruik maak van Landsat data. Post-klassifikasie verandering bied kragtige informasie oor die rigting van verandering en kan die persentasie van verandering van een klas na ‘n ander aandui. Beeld en NDVI differensievorming is egter veel vinniger om uit te voer en kan informasie rakende die algemene tendense in verandering lewer. Post-klassifikasie verandering kan dus gebruik word in gebiede van vinnige en beduidende verandering plaasvind, terwyl beeld en NDVI differensievorming nuttig kan wees om groot areas te dek waar min verandering verwag word.
APA, Harvard, Vancouver, ISO, and other styles
10

Potnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.

Full text
Abstract:
5G telecommunication systems must be ultra-reliable to meet the needs of the next evolution in communication. The systems deployed must be thoroughly tested and must conform to their standards. Software and network protocols are commonly tested with techniques like fuzzing, penetration testing, code review, conformance testing. With fuzzing, testers can send crafted inputs to monitor the System Under Test (SUT) for a response. 3GPP, the standardization body for the telecom system, produces new versions of specifications as part of continuously evolving features and enhancements. This leads to many versions of specifications for a network protocol like Radio Resource Control (RRC), and testers need to constantly update the testing tools and the testing environment. In this work, it is shown that by using the generic nature of RRC specifications, which are given in Abstract Syntax Notation One (ASN.1) description language, one can design a testing tool to adapt to all versions of 3GPP specifications. This thesis work introduces an ASN.1 based adaptive fuzzer that can be used for testing RRC and other network protocols based on ASN.1 description language. The fuzzer extracts knowledge about ongoing RRC messages using protocol description files of RRC, i.e., RRC ASN.1 schema from 3GPP, and uses the knowledge to fuzz RRC messages. The adaptive fuzzer identifies individual fields, sub-messages, and custom data types according to specifications when mutating the content of existing messages. Furthermore, the adaptive fuzzer has identified a previously unidentified vulnerability in Evolved Packet Core (EPC) of srsLTE and openLTE, two open-source LTE implementations, confirming the applicability to robustness testing of RRC and other network protocols.<br>5G-telekommunikationssystem måste vara extremt tillförlitliga för att möta behoven för den kommande utvecklingen inom kommunikation. Systemen som används måste testas noggrant och måste överensstämma med deras standarder. Programvara och nätverksprotokoll testas ofta med tekniker som fuzzing, penetrationstest, kodgranskning, testning av överensstämmelse. Med fuzzing kan testare skicka utformade input för att övervaka System Under Test (SUT) för ett svar. 3GPP, standardiseringsorganet för telekomsystemet, producerar ofta nya versioner av specifikationer för att möta kraven och bristerna från tidigare utgåvor. Detta leder till många versioner av specifikationer för ett nätverksprotokoll som Radio Resource Control (RRC) och testare behöver ständigt uppdatera testverktygen och testmiljön. I detta arbete visar vi att genom att använda den generiska karaktären av RRC-specifikationer, som ges i beskrivningsspråket Abstract Syntax Notation One (ASN.1), kan man designa ett testverktyg för att anpassa sig till alla versioner av 3GPP-specifikationer. Detta uppsatsarbete introducerar en ASN.1-baserad adaptiv fuzzer som kan användas för att testa RRC och andra nätverksprotokoll baserat på ASN.1- beskrivningsspråk. Fuzzer extraherar kunskap om pågående RRC meddelanden med användning av protokollbeskrivningsfiler för RRC, dvs RRC ASN.1 schema från 3GPP, och använder kunskapen för att fuzz RRC meddelanden. Den adaptiva fuzzer identifierar enskilda fält, delmeddelanden och anpassade datatyper enligt specifikationer när innehållet i befintliga meddelanden muteras. Dessutom har den adaptiva fuzzer identifierat en tidigare oidentifierad sårbarhet i Evolved Packet Core (EPC) för srsLTE och openLTE, två opensource LTE-implementeringar, vilket bekräftar tillämpligheten för robusthetsprovning av RRC och andra nätverksprotokoll.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Vulnerability detection system"

1

Holz, Thorsten. Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nicholas, Evans. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment. Springer, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nicholas, Evans. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment. Springer, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Detection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings. Springer International Publishing AG, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Detection Of Intrusions And Malware And Vulnerability Assessment 7th International Conference Dimva 2010 Bonn Germany July 89 2010 Proceedings. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Holz, Thorsten, and Herbert Bos. Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011, Proceedings. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Vulnerability detection system"

1

Zhang, Jiayuan, Yao Yao, Xiaoqi Li, Jian Xie, and Gaofei Wu. "An Android Vulnerability Detection System." In Network and System Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mrdovic, Sasa, and Branislava Drazenovic. "KIDS – Keyed Intrusion Detection System." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14215-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ibanez, P. "Experimental Vulnerability Detection in Civil Structures." In Structural Safety Evaluation Based on System Identification Approaches. Vieweg+Teubner Verlag, 1988. http://dx.doi.org/10.1007/978-3-663-05657-7_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bacs, Andrei, Remco Vermeulen, Asia Slowinska, and Herbert Bos. "System-Level Support for Intrusion Recovery." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37300-8_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gong, Huihui, Siqi Ma, Seyit Camtepe, Surya Nepal, and Chang Xu. "Vulnerability Detection Using Deep Learning Based Function Classification." In Network and System Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23020-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Graziano, Mariano, Lorenzo Flore, Andrea Lanzi, and Davide Balzarotti. "Subverting Operating System Properties Through Evolutionary DKOM Attacks." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

He, En, Daoyuan Wu, and Robert H. Deng. "Understanding Android VoIP Security: A System-Level Vulnerability Assessment." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52683-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Frossi, Alessandro, Federico Maggi, Gian Luigi Rizzo, and Stefano Zanero. "Selecting and Improving System Call Models for Anomaly Detection." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02918-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Song, Jingjing, Haiwu He, Zhuo Lv, Chunhua Su, Guangquan Xu, and Wei Wang. "An Efficient Vulnerability Detection Model for Ethereum Smart Contracts." In Network and System Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Srivastava, Abhinav, Andrea Lanzi, Jonathon Giffin, and Davide Balzarotti. "Operating System Interface Obfuscation and the Revealing of Hidden Operations." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Vulnerability detection system"

1

Farrell, Richard. "IDSVAF: Neural Network Intrusion Detection System Vulnerability Assessment Framework." In 2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD). IEEE, 2024. http://dx.doi.org/10.1109/icabcd62167.2024.10645279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sheng, Ze, Fenghua Wu, Xiangwu Zuo, Chao Li, Yuxin Qiao, and Hang Lei. "Research on the LLM-Driven Vulnerability Detection System Using LProtector." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA). IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10859408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ramires, Rafael, Ana Respício, and Ibéria Medeiros. "KAVE: A Knowledge-Based Multi-Agent System for Web Vulnerability Detection." In 2024 IEEE International Conference on Web Services (ICWS). IEEE, 2024. http://dx.doi.org/10.1109/icws62655.2024.00070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Zhe, Jian Zhao, Lei Chen, et al. "Embedded Operating System Vulnerability Detection Technology Based on Graph Neural Networks." In 2024 IEEE International Conference on Software System and Information Processing (ICSSIP). IEEE, 2024. https://doi.org/10.1109/icssip63203.2024.11012456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jaisabarish, C., and K. Nimala. "Development of a Vulnerability Detection System Utilizing Pattern Matching Technology and Security." In 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63760.2024.10910820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Mingyang, Yan Yu, Yixin Zou, and Yuanyuan Luo. "Design of a Smart Camera Vulnerability Detection System Based on Homology Analysis." In 2024 6th International Conference on Intelligent Control, Measurement and Signal Processing (ICMSP). IEEE, 2024. https://doi.org/10.1109/icmsp64464.2024.10866036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ali, Irshad, and Basant Subba. "VULDetect: A Lightweight Ensemble Based Framework for Automated Software System Vulnerability Detection." In TENCON 2024 - 2024 IEEE Region 10 Conference (TENCON). IEEE, 2024. https://doi.org/10.1109/tencon61640.2024.10903038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xiong, Zhe, and Weiyu Dong. "VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code." In 2024 6th International Conference on Communications, Information System and Computer Engineering (CISCE). IEEE, 2024. http://dx.doi.org/10.1109/cisce62493.2024.10653337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Ying, and Xin Guan. "Adversarial Training for Robustness Enhancement in LLM-Based Code Vulnerability Detection." In 2025 IEEE 7th International Conference on Communications, Information System and Computer Engineering (CISCE). IEEE, 2025. https://doi.org/10.1109/cisce65916.2025.11065803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shi, Guowei, Zeyang Zhao, Shiyi Chen, Huan Li, Xin Ren, and Jing Zhang. "Design of Vulnerability and Attack Detection System of Industrial Control System Based on Improved Genetic Algorithm." In 2024 International Conference on Power, Electrical Engineering, Electronics and Control (PEEEC). IEEE, 2024. https://doi.org/10.1109/peeec63877.2024.00086.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Vulnerability detection system"

1

Weissinger, Rebecca. Evaluation of hanging-garden endemic-plant monitoring at Southeast Utah Group national parks, 2013–2020. Edited by Alice Wondrak Biel. National Park Service, 2022. http://dx.doi.org/10.36967/2294868.

Full text
Abstract:
Hanging gardens are the most common type of spring at Arches National Park (NP) and Natural Bridges National Monument (NM). They are also present at Canyonlands National Park, but hanging gardens are rare off the Colorado Plateau. Their cliffside setting provides stable access to water without flood disturbance. This combination provides unique habitat that is rich in endemic plant species. The diffuse, seeping emergence of water makes measuring springflow impossible at most sites. Park managers have an interest in monitoring hanging gardens—especially as the climate warms and aridity and water demand both increase. The Northern Colorado Plateau Net-work (NCPN) proposed methods for monitoring seven perennial endemic-plant species at hanging gardens as indicators of spring health and proxies for water availability. Because hanging gardens occur on bedrock outcrops, systematic or random sampling was not possible due to safety concerns and potential resource damage on steep, wet slopes. Examining eight years (2013–2020) of data, this report evaluates the suitability of endemic-plant count data at hanging gardens as a monitoring indicator. It also provides our first evaluation of status and trends at NCPN hanging gardens. The seven species included in monitoring were Rydberg’s thistle (Cirsium rydbergii), Kachina daisy (Erigeron kachinensis), alcove death camas (Zigadenus vaginatus), alcove bog orchid (Habenaria zothecina), cave primrose (Primula specuicola), alcove columbine (Aquilegia micrantha), and Eastwood’s monkeyflower (Mimulus eastwoodiae). Six of the seven species were found at each park. Up to 500 individuals of each species were counted at 42 hanging gardens in Arches NP, 14 hanging gardens in Natural Bridges NM, and 3 hanging gardens in Canyonlands NP. Larger populations were divided into count classes of 501–1,000, 1,001–10,000, and more than 10,000 individuals. Counts from two independent observers and from back-to-back years of sampling were compared for repeatability. Repeatability in count classes was less than 50% for Kachina daisy and Eastwood’s monkeyflower, which both propagate vegetatively via ramets and/or stolons. Repeatability was greater than 90% for only one species, Rydberg’s thistle. The remaining species were categorized in different classes between 15–40% of the time. Independent-observer comparisons were only available for 6.6% of the dataset, but these observations suggested that (1) observer bias was present and (2) the observer with more experience working in hanging gardens generally had higher counts than the observer with less experience in this system. Although repeatability was variable, it was within the range reported by other studies for most species. The NCPN, in discussion with park staff, has elected to make some modifications to the protocol but will continue using endemic plant counts as an indicator of hanging-garden health to maintain a biological variable as a complement to our physical-response data. This is due to their high value to park biodiversity and the difficulty of developing a more robust approach to monitoring in these sites. Endemic-plant monitoring will continue for the five species with the highest repeatability during pilot monitoring and will focus on detecting changes in smaller populations. Most hanging gardens have more than one endemic species present, so several populations can be tracked at each site. Our period of record is relatively brief, and the distribution of endemic-plant populations in different count classes at these sites has not yet shown any statistical trends over time. Be-cause of the large count classes, our methods are more sensitive to showing change in smaller populations (fewer than 500 individuals). Small populations are also of greatest concern to park managers because of their vulnerability to declines or extirpation due to drought. Over-all, more sites had endemic-plant populations of fewer than 100 individuals at the end...
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!