Academic literature on the topic 'Vulnerability detection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Vulnerability detection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Vulnerability detection system"
Le Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textLuo, Fucai, Jingyi Xie, Jingdong Guo, Wenliang Liu, Jindong He, and Hang Zhang. "Vulnerability Detection System for Power Information Based on Network Traffic Identification Technology." Journal of Physics: Conference Series 2401, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2401/1/012042.
Full textShiraishi, M., Y. Fujinuma, T. Ishikawa, K. Ishige, and H. Doki. "An Ultrasonic Double-Sheet Detection System for Collators." Journal of Engineering for Industry 114, no. 4 (1992): 489–93. http://dx.doi.org/10.1115/1.2900702.
Full textHou, Jin-bing, Tong Li, and Cheng Chang. "Research for Vulnerability Detection of Embedded System Firmware." Procedia Computer Science 107 (2017): 814–18. http://dx.doi.org/10.1016/j.procs.2017.03.181.
Full textJeo John, Precious, and Sumit Surendran. "Vulnerabilities Detection by Matching with known Vulnerabilities." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28422.
Full textKalyan Manohar, Immadisetti, Dadisetti Vishnu Datta, and Lekshmi S. Raveendran. "Website Vulnerability Scanning System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43079.
Full textAzhari, Firman. "Quick detection of NFC vulnerability." Information Management & Computer Security 22, no. 2 (2014): 134–40. http://dx.doi.org/10.1108/imcs-09-2013-0067.
Full textGuo, Ran, Weijie Chen, Lejun Zhang, Guopeng Wang, and Huiling Chen. "Smart Contract Vulnerability Detection Model Based on Siamese Network (SCVSN): A Case Study of Reentrancy Vulnerability." Energies 15, no. 24 (2022): 9642. http://dx.doi.org/10.3390/en15249642.
Full textSun, Meng, Qi Wang, Jue He, et al. "Research on automatic scanning method of network vulnerabilities in power system." Journal of Physics: Conference Series 2290, no. 1 (2022): 012036. http://dx.doi.org/10.1088/1742-6596/2290/1/012036.
Full textDissertations / Theses on the topic "Vulnerability detection system"
Hou, Haiyu Dozier Gerry V. "GENERTIA a system for vulnerability analysis, design and redesign of immunity-based anomaly detection system /." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Fall/Dissertations/HOU_HAIYU_22.pdf.
Full textMunir, Rashid. "A Quantitative Security Assessment of Modern Cyber Attacks. A Framework for Quantifying Enterprise Security Risk Level Through System's Vulnerability Analysis by Detecting Known and Unknown Threats." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/14251.
Full textBughio, Kulsoom Saima. "IoMT security: A semantic framework for vulnerability detection in remote patient monitoring." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2841.
Full textЯцентюк, Святослав Сергійович, та Sviatoslav Yatsentiuk. "Розробка та дослідження автоматизованої системи виявлення вразливостей розподілених комп'ютерних систем". Master's thesis, Тернопіль, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36532.
Full textGabelli, Filippo. "Security analysis of physical attacks to offshore O&G facilities." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textLiu, Long. "Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/17846.
Full textKasse, Mamadou. "Système de Ρréventiοn cοntre les vulnérabilités et de Détectiοn des Anοmalies dans les Réseaux Ιnfοrmatiques". Electronic Thesis or Diss., Normandie, 2024. https://theses.hal.science/tel-04885354.
Full textAkrout, Rim. "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web." Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00782565.
Full textCallaghan, Kerry Lee. "The use of remote sensing and GIS in the identification and vulnerability detection of coastal erosion as a hazard in False Bay, South Africa." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86611.
Full textPotnuru, Srinath. "Fuzzing Radio Resource Control messages in 5G and LTE systems : To test telecommunication systems with ASN.1 grammar rules based adaptive fuzzer." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294140.
Full textBooks on the topic "Vulnerability detection system"
Holz, Thorsten. Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference; DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011. Proceedings. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textNicholas, Evans. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment. Springer, 2023.
Find full textNicholas, Evans. Handbook of Biometric Anti-Spoofing: Presentation Attack Detection and Vulnerability Assessment. Springer, 2024.
Find full textDetection of Intrusions and Malware, and Vulnerability Assessment: 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014, Proceedings. Springer International Publishing AG, 2014.
Find full textDetection Of Intrusions And Malware And Vulnerability Assessment 7th International Conference Dimva 2010 Bonn Germany July 89 2010 Proceedings. Springer, 2010.
Find full textHolz, Thorsten, and Herbert Bos. Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011, Amsterdam, The Netherlands, July 7-8, 2011, Proceedings. Springer, 2012.
Find full textBook chapters on the topic "Vulnerability detection system"
Zhang, Jiayuan, Yao Yao, Xiaoqi Li, Jian Xie, and Gaofei Wu. "An Android Vulnerability Detection System." In Network and System Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_13.
Full textMrdovic, Sasa, and Branislava Drazenovic. "KIDS – Keyed Intrusion Detection System." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14215-4_10.
Full textIbanez, P. "Experimental Vulnerability Detection in Civil Structures." In Structural Safety Evaluation Based on System Identification Approaches. Vieweg+Teubner Verlag, 1988. http://dx.doi.org/10.1007/978-3-663-05657-7_20.
Full textBacs, Andrei, Remco Vermeulen, Asia Slowinska, and Herbert Bos. "System-Level Support for Intrusion Recovery." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37300-8_9.
Full textGong, Huihui, Siqi Ma, Seyit Camtepe, Surya Nepal, and Chang Xu. "Vulnerability Detection Using Deep Learning Based Function Classification." In Network and System Security. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-23020-2_1.
Full textGraziano, Mariano, Lorenzo Flore, Andrea Lanzi, and Davide Balzarotti. "Subverting Operating System Properties Through Evolutionary DKOM Attacks." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40667-1_1.
Full textHe, En, Daoyuan Wu, and Robert H. Deng. "Understanding Android VoIP Security: A System-Level Vulnerability Assessment." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52683-2_6.
Full textFrossi, Alessandro, Federico Maggi, Gian Luigi Rizzo, and Stefano Zanero. "Selecting and Improving System Call Models for Anomaly Detection." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02918-9_13.
Full textSong, Jingjing, Haiwu He, Zhuo Lv, Chunhua Su, Guangquan Xu, and Wei Wang. "An Efficient Vulnerability Detection Model for Ethereum Smart Contracts." In Network and System Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5_26.
Full textSrivastava, Abhinav, Andrea Lanzi, Jonathon Giffin, and Davide Balzarotti. "Operating System Interface Obfuscation and the Revealing of Hidden Operations." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22424-9_13.
Full textConference papers on the topic "Vulnerability detection system"
Farrell, Richard. "IDSVAF: Neural Network Intrusion Detection System Vulnerability Assessment Framework." In 2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD). IEEE, 2024. http://dx.doi.org/10.1109/icabcd62167.2024.10645279.
Full textSheng, Ze, Fenghua Wu, Xiangwu Zuo, Chao Li, Yuxin Qiao, and Hang Lei. "Research on the LLM-Driven Vulnerability Detection System Using LProtector." In 2024 IEEE 4th International Conference on Data Science and Computer Application (ICDSCA). IEEE, 2024. https://doi.org/10.1109/icdsca63855.2024.10859408.
Full textRamires, Rafael, Ana Respício, and Ibéria Medeiros. "KAVE: A Knowledge-Based Multi-Agent System for Web Vulnerability Detection." In 2024 IEEE International Conference on Web Services (ICWS). IEEE, 2024. http://dx.doi.org/10.1109/icws62655.2024.00070.
Full textZhang, Zhe, Jian Zhao, Lei Chen, et al. "Embedded Operating System Vulnerability Detection Technology Based on Graph Neural Networks." In 2024 IEEE International Conference on Software System and Information Processing (ICSSIP). IEEE, 2024. https://doi.org/10.1109/icssip63203.2024.11012456.
Full textJaisabarish, C., and K. Nimala. "Development of a Vulnerability Detection System Utilizing Pattern Matching Technology and Security." In 2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63760.2024.10910820.
Full textLi, Mingyang, Yan Yu, Yixin Zou, and Yuanyuan Luo. "Design of a Smart Camera Vulnerability Detection System Based on Homology Analysis." In 2024 6th International Conference on Intelligent Control, Measurement and Signal Processing (ICMSP). IEEE, 2024. https://doi.org/10.1109/icmsp64464.2024.10866036.
Full textAli, Irshad, and Basant Subba. "VULDetect: A Lightweight Ensemble Based Framework for Automated Software System Vulnerability Detection." In TENCON 2024 - 2024 IEEE Region 10 Conference (TENCON). IEEE, 2024. https://doi.org/10.1109/tencon61640.2024.10903038.
Full textXiong, Zhe, and Weiyu Dong. "VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code." In 2024 6th International Conference on Communications, Information System and Computer Engineering (CISCE). IEEE, 2024. http://dx.doi.org/10.1109/cisce62493.2024.10653337.
Full textZhao, Ying, and Xin Guan. "Adversarial Training for Robustness Enhancement in LLM-Based Code Vulnerability Detection." In 2025 IEEE 7th International Conference on Communications, Information System and Computer Engineering (CISCE). IEEE, 2025. https://doi.org/10.1109/cisce65916.2025.11065803.
Full textShi, Guowei, Zeyang Zhao, Shiyi Chen, Huan Li, Xin Ren, and Jing Zhang. "Design of Vulnerability and Attack Detection System of Industrial Control System Based on Improved Genetic Algorithm." In 2024 International Conference on Power, Electrical Engineering, Electronics and Control (PEEEC). IEEE, 2024. https://doi.org/10.1109/peeec63877.2024.00086.
Full textReports on the topic "Vulnerability detection system"
Weissinger, Rebecca. Evaluation of hanging-garden endemic-plant monitoring at Southeast Utah Group national parks, 2013–2020. Edited by Alice Wondrak Biel. National Park Service, 2022. http://dx.doi.org/10.36967/2294868.
Full text