Journal articles on the topic 'Vulnerability detection system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Vulnerability detection system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Le Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textLuo, Fucai, Jingyi Xie, Jingdong Guo, Wenliang Liu, Jindong He, and Hang Zhang. "Vulnerability Detection System for Power Information Based on Network Traffic Identification Technology." Journal of Physics: Conference Series 2401, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2401/1/012042.
Full textShiraishi, M., Y. Fujinuma, T. Ishikawa, K. Ishige, and H. Doki. "An Ultrasonic Double-Sheet Detection System for Collators." Journal of Engineering for Industry 114, no. 4 (1992): 489–93. http://dx.doi.org/10.1115/1.2900702.
Full textHou, Jin-bing, Tong Li, and Cheng Chang. "Research for Vulnerability Detection of Embedded System Firmware." Procedia Computer Science 107 (2017): 814–18. http://dx.doi.org/10.1016/j.procs.2017.03.181.
Full textJeo John, Precious, and Sumit Surendran. "Vulnerabilities Detection by Matching with known Vulnerabilities." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 01 (2024): 1–10. http://dx.doi.org/10.55041/ijsrem28422.
Full textKalyan Manohar, Immadisetti, Dadisetti Vishnu Datta, and Lekshmi S. Raveendran. "Website Vulnerability Scanning System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43079.
Full textAzhari, Firman. "Quick detection of NFC vulnerability." Information Management & Computer Security 22, no. 2 (2014): 134–40. http://dx.doi.org/10.1108/imcs-09-2013-0067.
Full textGuo, Ran, Weijie Chen, Lejun Zhang, Guopeng Wang, and Huiling Chen. "Smart Contract Vulnerability Detection Model Based on Siamese Network (SCVSN): A Case Study of Reentrancy Vulnerability." Energies 15, no. 24 (2022): 9642. http://dx.doi.org/10.3390/en15249642.
Full textSun, Meng, Qi Wang, Jue He, et al. "Research on automatic scanning method of network vulnerabilities in power system." Journal of Physics: Conference Series 2290, no. 1 (2022): 012036. http://dx.doi.org/10.1088/1742-6596/2290/1/012036.
Full textThannoun, Rayan Gh, and Omar Abdullah Ismaeel. "Flood Risk Vulnerability Detection based on the Developing Topographic Wetness Index Tool in Geographic Information System." IOP Conference Series: Earth and Environmental Science 1300, no. 1 (2024): 012012. http://dx.doi.org/10.1088/1755-1315/1300/1/012012.
Full textSong, Guang Jun, Chun Lan Zhao, and Ming Li. "Study on Software Vulnerability Dynamic Discovering System." Applied Mechanics and Materials 151 (January 2012): 673–77. http://dx.doi.org/10.4028/www.scientific.net/amm.151.673.
Full textWang, Xin, Runpu Wu, Jinxin Ma, Gang Long, and Jedeng Han. "Research on Vulnerability Detection Technology for WEB Mail System." Procedia Computer Science 131 (2018): 124–30. http://dx.doi.org/10.1016/j.procs.2018.04.194.
Full textV, Bharathi, and Vinoth Kumar C N S. "Vulnerability Detection in Cyber-Physical System Using Machine Learning." Scalable Computing: Practice and Experience 25, no. 1 (2024): 577–91. http://dx.doi.org/10.12694/scpe.v25i1.2405.
Full textWalkowski, Michał, Jacek Oko, and Sławomir Sujecki. "Vulnerability Management Models Using a Common Vulnerability Scoring System." Applied Sciences 11, no. 18 (2021): 8735. http://dx.doi.org/10.3390/app11188735.
Full textOjasvini, Nitesh, Piyush, Narina Thakur, and Arvind Rehalia. "Intrusion Detection System using Artificial Immune Systems: A Case Study." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 2 (2018): 19. http://dx.doi.org/10.23956/ijarcsse.v8i2.571.
Full textEkene, Ozioko Frank, and Mba Chioma Juliet. "The Application of Deep Neural Network to Vulnerability Management on Cyber Physical System – A Systematic Review." International Journal of Research and Innovation in Applied Science X, no. IV (2025): 1276–85. https://doi.org/10.51584/ijrias.2025.10040102.
Full textLiu, Hongkun, Nianci Wang, and Sirong Liang. "Wireless communication network security intelligent monitoring system based on machine learning." Journal of Physics: Conference Series 2083, no. 3 (2021): 032045. http://dx.doi.org/10.1088/1742-6596/2083/3/032045.
Full textOdeh, Najla, and Sherin Hijazi. "Detecting and Preventing Common Web Application Vulnerabilities: A Comprehensive Approach." International Journal of Information Technology and Computer Science 15, no. 3 (2023): 26–41. http://dx.doi.org/10.5815/ijitcs.2023.03.03.
Full textLi, Zhen, Deqing Zou, Jing Tang, Zhihao Zhang, Mingqian Sun, and Hai Jin. "A Comparative Study of Deep Learning-Based Vulnerability Detection System." IEEE Access 7 (2019): 103184–97. http://dx.doi.org/10.1109/access.2019.2930578.
Full textTondarkar, Abhishek A. "AI Driven Vulnerability Analysis Systems." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50022.
Full textLiang, Bei Hai, Bin Bin Qu, Sheng Jiang, and Chu Tian Ye. "Research on Vulnerability Detection for Software Based on Taint Analysis." Applied Mechanics and Materials 347-350 (August 2013): 3715–20. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.3715.
Full textYevhenii, Kubiuk, and Kyselov Gennadiy. "Comparative analysis of approaches to source code vulnerability detection based on deep learning methods." Technology audit and production reserves 3, no. 2(59) (2021): 19–23. https://doi.org/10.15587/2706-5448.2021.233534.
Full textLiu, Lili, Zhen Li, Yu Wen, and Penglong Chen. "Investigating the impact of vulnerability datasets on deep learning-based vulnerability detectors." PeerJ Computer Science 8 (May 11, 2022): e975. http://dx.doi.org/10.7717/peerj-cs.975.
Full textWang, Chong, Guang Jun Song, and Chun Lan Zhao. "Study on Software Vulnerability Discovering Based on Linux Sequence of System Call." Applied Mechanics and Materials 151 (January 2012): 537–43. http://dx.doi.org/10.4028/www.scientific.net/amm.151.537.
Full textPreethi K, Senthamil, and Murugan A. "Analysis of Vulnerability Detection Tool for Web Services." International Journal of Engineering & Technology 7, no. 3.12 (2018): 773. http://dx.doi.org/10.14419/ijet.v7i3.12.16499.
Full textLi, Xingzheng, Bingwen Feng, Guofeng Li, Tong Li, and Mingjin He. "A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code." Security and Communication Networks 2021 (July 29, 2021): 1–11. http://dx.doi.org/10.1155/2021/9997641.
Full textSushama, R. Borhade* Sandip A. Kahate. "DETECTION OF BACKDOOR ATTCKS WITH GENERATING ALERTS OVER MOBILE NETWORKS." International Journal OF Engineering Sciences & Management Research 3, no. 6 (2016): 37–42. https://doi.org/10.5281/zenodo.55202.
Full textSeara, João Pedro, and Carlos Serrão. "Automation of System Security Vulnerabilities Detection Using Open-Source Software." Electronics 13, no. 5 (2024): 873. http://dx.doi.org/10.3390/electronics13050873.
Full textMrs.G.Anitha,, K.Bindu sree, B.Sai Lavanya, and B.Akshaya. "ML-Powered Insight Into Code Software Vulnerability." International Journal of Information Technology and Computer Engineering 13, no. 2 (2025): 1416–23. https://doi.org/10.62647/ijitce2025v13i2pp1416-1423.
Full textZhu, You Chan, and Hui Li Liang. "The SQL Injection Vulnerability Detection of the Web Application." Applied Mechanics and Materials 198-199 (September 2012): 1457–61. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.1457.
Full textKubiuk, Yevhenii, and Gennadiy Kyselov. "Comparative analysis of approaches to source code vulnerability detection based on deep learning methods." Technology audit and production reserves 3, no. 2(59) (2021): 19–23. http://dx.doi.org/10.15587/2706-5448.2021.233534.
Full textGürfidan, Remzi. "VULREM: Fine-Tuned BERT-Based Source-Code Potential Vulnerability Scanning System to Mitigate Attacks in Web Applications." Applied Sciences 14, no. 21 (2024): 9697. http://dx.doi.org/10.3390/app14219697.
Full textTian, Junfeng, Wenjing Xing, and Zhen Li. "BVDetector: A program slice-based binary code vulnerability intelligent detection system." Information and Software Technology 123 (July 2020): 106289. http://dx.doi.org/10.1016/j.infsof.2020.106289.
Full textKumawat, Anjali, Anil Kumar Sharma, and Sunita Kumawat. "Identification of Cryptographic Vulnerability and Malware Detection in Android." International Journal of Information Security and Privacy 11, no. 3 (2017): 15–28. http://dx.doi.org/10.4018/ijisp.2017070102.
Full textYang, Shuo, Jian Guo, and Xue Rui. "Formal Analysis and Detection for ROS2 Communication Security Vulnerability." Electronics 13, no. 9 (2024): 1762. http://dx.doi.org/10.3390/electronics13091762.
Full textMoreira, Diogo, João Pedro Seara, João Pedro Pavia, and Carlos Serrão. "Intelligent Platform for Automating Vulnerability Detection in Web Applications." Electronics 14, no. 1 (2024): 79. https://doi.org/10.3390/electronics14010079.
Full textBennouk, Khalid, Nawal Ait Aali, Younès El Bouzekri El Idrissi, Bechir Sebai, Abou Zakaria Faroukhi, and Dorra Mahouachi. "A Comprehensive Review and Assessment of Cybersecurity Vulnerability Detection Methodologies." Journal of Cybersecurity and Privacy 4, no. 4 (2024): 853–908. http://dx.doi.org/10.3390/jcp4040040.
Full textJyoti, Snehi, Bhandari Abhinav, Baggan Vidhu, and Snehi Ritu Manish. "Diverse Methods for Signature based Intrusion Detection Schemes Adopted." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 2 (2020): 44–49. https://doi.org/10.35940/ijrte.A2791.079220.
Full textB. Kalaiselvi, B. Kalaiselvi, Mannepalle Sai Chandu, Maridhu Narendra, and Mannepalle Deekshith Kumar. "SQL-Injection Vulnerability Scanning Tool for Automatic Creation of SQL-Injection Attacks." International Journal of Advances in Engineering and Management 7, no. 1 (2025): 577–87. https://doi.org/10.35629/5252-0701577587.
Full textHu, Jinchang, Jinfu Chen, Sher Ali, et al. "A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter." Security and Communication Networks 2021 (May 21, 2021): 1–14. http://dx.doi.org/10.1155/2021/5581274.
Full textUmar, Umar, Kamaluddeen Usman .., Mohd Fadzil Hassan, Aminu Aminu Muazu, and M. S. Liew. "An IoT Device-Level Vulnerability Control Model Through Federated Detection." Journal of Intelligent Systems and Internet of Things 12, no. 2 (2024): 89–98. http://dx.doi.org/10.54216/jisiot.120207.
Full textZhao, Jiazhen, Yuliang Lu, Kailong Zhu, Zehan Chen, and Hui Huang. "Cefuzz: An Directed Fuzzing Framework for PHP RCE Vulnerability." Electronics 11, no. 5 (2022): 758. http://dx.doi.org/10.3390/electronics11050758.
Full textPopereshnyak, S. V., R. O. Skoryk, D. V. Kuptsov, and R. V. Kravchenko. "Human face recognition system in video stream." PROBLEMS IN PROGRAMMING, no. 2-3 (September 2024): 296–304. https://doi.org/10.15407/pp2024.02-03.296.
Full textZheng, Xiaokun. "Computer Deep Learning Network Security Vulnerability Detection Based on Virtual Reality Technology." Advances in Multimedia 2022 (May 5, 2022): 1–9. http://dx.doi.org/10.1155/2022/6039690.
Full textGupta, Manoj R. "Eternal Blue Vulnerability." International Journal for Research in Applied Science and Engineering Technology 11, no. 6 (2023): 1054–60. http://dx.doi.org/10.22214/ijraset.2023.53795.
Full textZhang, Guoqing, Wengen Gao, Yunfei Li, Xinxin Guo, Pengfei Hu, and Jiaming Zhu. "Detection of False Data Injection Attacks in a Smart Grid Based on WLS and an Adaptive Interpolation Extended Kalman Filter." Energies 16, no. 20 (2023): 7203. http://dx.doi.org/10.3390/en16207203.
Full textAl salmawi, Haneen mohammed adhab. "Critical Evaluation of SQL Injection Security Measures in Web Applications." Wasit Journal for Pure sciences 4, no. 1 (2025): 104–19. https://doi.org/10.31185/wjps.566.
Full textFaiz Mulla, Yahaiya. "Zapper: Vulnerability and Port Scanner Tool." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04061.
Full textBhilare, Shruti, Vivek Kanhangad, and Narendra Chaudhari. "A study on vulnerability and presentation attack detection in palmprint verification system." Pattern Analysis and Applications 21, no. 3 (2017): 769–82. http://dx.doi.org/10.1007/s10044-017-0606-y.
Full text