Journal articles on the topic 'Vulnerability discovery model (VDM)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Vulnerability discovery model (VDM).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Sharma, Ruchi, Ritu Sibal, and A. K. Shrivastava. "Vulnerability Discovery Modeling for Open and Closed Source Software." International Journal of Secure Software Engineering 7, no. 4 (2016): 19–38. http://dx.doi.org/10.4018/ijsse.2016100102.
Full textWang, Xiajing, Rui Ma, Binbin Li, Donghai Tian, and Xuefei Wang. "E-WBM: An Effort-Based Vulnerability Discovery Model." IEEE Access 7 (2019): 44276–92. http://dx.doi.org/10.1109/access.2019.2907977.
Full textTaib, Abidah Hj Mat, Wan Nor Ashiqin Wan Ali, and Nurul Sharidah Shaari. "ICMPV6 Vulnerability." International Journal of Mobile Computing and Multimedia Communications 5, no. 2 (2013): 78–100. http://dx.doi.org/10.4018/jmcmc.2013040106.
Full textKansal, Yogita, P. K. Kapur, Uday Kumar, and Deepak Kumar. "User-dependent vulnerability discovery model and its interdisciplinary nature." Life Cycle Reliability and Safety Engineering 6, no. 1 (2017): 23–29. http://dx.doi.org/10.1007/s41872-017-0003-y.
Full textJohnston, Reuben, Shahryar Sarkani, Thomas Mazzuchi, Thomas Holzer, and Timothy Eveleigh. "Bayesian-model averaging using MCMCBayes for web-browser vulnerability discovery." Reliability Engineering & System Safety 183 (March 2019): 341–59. http://dx.doi.org/10.1016/j.ress.2018.11.030.
Full textBhatt, Navneet, Adarsh Anand, V. S. S. Yadavalli, and Vijay Kumar. "Modeling and Characterizing Software Vulnerabilities." International Journal of Mathematical, Engineering and Management Sciences 2, no. 4 (2017): 288–99. http://dx.doi.org/10.33889/ijmems.2017.2.4-022.
Full textAnand, Adarsh, Navneet Bhatt, and Deepti Aggrawal. "Modeling Software Patch Management Based on Vulnerabilities Discovered." International Journal of Reliability, Quality and Safety Engineering 27, no. 02 (2019): 2040003. http://dx.doi.org/10.1142/s0218539320400033.
Full textYuan, Xue, Guanjun Lin, Yonghang Tai, and Jun Zhang. "Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization." Security and Communication Networks 2022 (January 18, 2022): 1–12. http://dx.doi.org/10.1155/2022/5203217.
Full textU. Rahane, Kavita, and A. B. Pawar. "A REVIEW ON CYBERSECURITY VULNERABILITY DISCOVERY AND MITIGATION MODEL IN SMART COMPUTING." International Journal of Engineering Applied Sciences and Technology 09, no. 05 (2024): 68–77. http://dx.doi.org/10.33564/ijeast.2024.v09i05.008.
Full textNarang, Swati, P. K. Kapur, D. Damodaran, and A. K. Shrivastava. "Bi-Criterion Problem to Determine Optimal Vulnerability Discovery and Patching Time." International Journal of Reliability, Quality and Safety Engineering 25, no. 01 (2018): 1850002. http://dx.doi.org/10.1142/s021853931850002x.
Full textAbraham, Subil, and Suku Nair. "Comparative analysis and patch optimization using the cyber security analytics framework." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (2017): 161–80. http://dx.doi.org/10.1177/1548512917705743.
Full textZhang, Liumei, Wei Zhang, Yichuan Wang, Bowen Xia, and Yu Han. "Fine-Grained Modeling of ROP Vulnerability Exploitation Process under Stack Overflow Based on Petri Nets." Electronics 12, no. 23 (2023): 4741. http://dx.doi.org/10.3390/electronics12234741.
Full textSchiele, Miriam A., Katharina Herzog, Leonie Kollert, et al. "Extending the vulnerability–stress model of mental disorders: three-dimensional NPSR1 × environment × coping interaction study in anxiety." British Journal of Psychiatry 217, no. 5 (2020): 645–50. http://dx.doi.org/10.1192/bjp.2020.73.
Full textJoh, HyunChul. "Software Risk Assessment for Windows Operating Systems with respect to CVSS." European Journal of Engineering Research and Science 4, no. 11 (2019): 41–45. http://dx.doi.org/10.24018/ejers.2019.4.11.1610.
Full textJoh, HyunChul. "Software Risk Assessment for Windows Operating Systems with respect to CVSS." European Journal of Engineering and Technology Research 4, no. 11 (2019): 41–45. http://dx.doi.org/10.24018/ejeng.2019.4.11.1610.
Full textKathiresan, Gopinath. "AI-Augmented Vulnerability Discovery through Static Code Pattern Clustering in Micro services." International Journal of Scientific Research and Management (IJSRM) 13, no. 05 (2025): 2145–54. https://doi.org/10.18535/ijsrm/v13i05.ec01.
Full textJarr, Kai-Uwe, Jianqin Ye, Yoko Kojima, et al. "18 F-Fluorodeoxyglucose-Positron Emission Tomography Imaging Detects Response to Therapeutic Intervention and Plaque Vulnerability in a Murine Model of Advanced Atherosclerotic Disease—Brief Report." Arteriosclerosis, Thrombosis, and Vascular Biology 40, no. 12 (2020): 2821–28. http://dx.doi.org/10.1161/atvbaha.120.315239.
Full textYang, Pei-Chi, Kevin R. DeMarco, Parya Aghasafari, et al. "A Computational Pipeline to Predict Cardiotoxicity." Circulation Research 126, no. 8 (2020): 947–64. http://dx.doi.org/10.1161/circresaha.119.316404.
Full textBuja, Atdhe. "AN ONLINE SQL VULNERABILITY ASSESSMENT TOOL AND IT’S IMPACT ON SMEs." International Journal of Advanced Research in Computer Science 13, no. 5 (2022): 23–28. http://dx.doi.org/10.26483/ijarcs.v13i5.6903.
Full textForster, J. I., S. Köglsberger, C. Trefois, et al. "Characterization of Differentiated SH-SY5Y as Neuronal Screening Model Reveals Increased Oxidative Vulnerability." Journal of Biomolecular Screening 21, no. 5 (2016): 496–509. http://dx.doi.org/10.1177/1087057115625190.
Full textLi, Qin, Mark E. Robinson, Etienne Leveille, et al. "Computational Discovery and Validation of NAD+ Biosynthesis As Unique Vulnerability in B-Lymphoid Malignancies." Blood 142, Supplement 1 (2023): 418. http://dx.doi.org/10.1182/blood-2023-190269.
Full textNingrum, Rohima Wahyu, Hendra Fauzi, Wiwit Suryanto, Estuning Tyas Wulan Mei, and Risky Nuri Amelia. "Microtremor Data to Strengthen the Students’ Mastery of Materials in the Implementation of Integrated Physics Learning." Jurnal Penelitian Fisika dan Aplikasinya (JPFA) 10, no. 1 (2020): 81. http://dx.doi.org/10.26740/jpfa.v10n1.p81-89.
Full textMadanan, Mukesh, Biju T. Sayed, Nurul Akhmal Mohd Zulkefli, and Nitha C. Velayudhan. "An Artificial Intelligence Approach Based on Hybrid CNN-XGB Model to Achieve High Prediction Accuracy through Feature Extraction, Classification and Regression for Enhancing Drug Discovery in Biomedicine." International Journal of Biology and Biomedical Engineering 15 (June 2, 2021): 190–201. http://dx.doi.org/10.46300/91011.2021.15.22.
Full textMatovu, Daniel, and Paul E. Alele. "Seizure vulnerability and anxiety responses following chronic co-administration and acute withdrawal of caffeine and ethanol in a rat model." Journal of Basic and Clinical Physiology and Pharmacology 29, no. 1 (2018): 1–10. http://dx.doi.org/10.1515/jbcpp-2017-0018.
Full textAghababazadeh, Masoumeh, Ana Castillo-Orozco, Niusha Khazaei, Wajih Jawhar, Geoffroy Danieu, and Livia Garzia. "Abstract A074 Uncovering chemoresistance mechanisms in CIC-DUX4 sarcoma using a novel xenograft model." Cancer Research 84, no. 17_Supplement (2024): A074. http://dx.doi.org/10.1158/1538-7445.pediatric24-a074.
Full textNidhi Mishra. "Employing Evolutionary Computing and Hybrid Artificial Neural Networks to Improve Drug Discovery." Communications on Applied Nonlinear Analysis 32, no. 2s (2024): 64–75. http://dx.doi.org/10.52783/cana.v32.2251.
Full textTotura, Allison L., and Sina Bavari. "Broad-spectrum coronavirus antiviral drug discovery." Expert Opinion on Drug Discovery 14, no. 4 (2019): 397–412. https://doi.org/10.5281/zenodo.13531117.
Full textTotura, Allison L., and Sina Bavari. "Broad-spectrum coronavirus antiviral drug discovery." Expert Opinion on Drug Discovery 14, no. 4 (2019): 397–412. https://doi.org/10.5281/zenodo.13531117.
Full textChen, Xiao, Le-Tian Sha, Fu Xiao, Jia-Ye Pan, and Jian-Kuo Dong. "AB-DHD: An Attention Mechanism and Bi-Directional Gated Recurrent Unit Based Model for Dynamic Link Library Hijacking Vulnerability Discovery." Journal of Computer Science and Technology 40, no. 3 (2025): 887–903. https://doi.org/10.1007/s11390-025-4497-x.
Full textMeyers, Tatyana A., Jackie A. Heitzman, and DeWayne Townsend. "DMD carrier model with mosaic dystrophin expression in the heart reveals complex vulnerability to myocardial injury." Human Molecular Genetics 29, no. 6 (2020): 944–54. http://dx.doi.org/10.1093/hmg/ddaa015.
Full textKoo, Kijong, Daesung Moon, Jun-Ho Huh, Se-Hoon Jung, and Hansung Lee. "Attack Graph Generation with Machine Learning for Network Security." Electronics 11, no. 9 (2022): 1332. http://dx.doi.org/10.3390/electronics11091332.
Full textZhou, Xin, Jianmin Pang, Zheng Shan, et al. "TMVDPatch: A Trusted Multi-View Decision System for Security Patch Identification." Applied Sciences 13, no. 6 (2023): 3938. http://dx.doi.org/10.3390/app13063938.
Full textPan, Yan, Wei Lin, Liang Jiao, and Yuefei Zhu. "Model-Based Grey-Box Fuzzing of Network Protocols." Security and Communication Networks 2022 (May 5, 2022): 1–13. http://dx.doi.org/10.1155/2022/6880677.
Full textZhang, Yifan, Kailong Zhu, Jie Peng, Yuliang Lu, Qian Chen, and Zixiong Li. "StatePre: A Large Language Model-Based State-Handling Method for Network Protocol Fuzzing." Electronics 14, no. 10 (2025): 1931. https://doi.org/10.3390/electronics14101931.
Full textPhansopkar, Pratik. "FEAR AVOIDANCE MODEL OF KINESIOPHOBIA AND REHABILITATION." Journal of Medical pharmaceutical and allied sciences 10, no. 5 (2021): 3529–33. http://dx.doi.org/10.22270/jmpas.v10i5.1267.
Full textZhao, Wendian, Yongjie Wang, Xinli Xiong, and Jiazhen Zhao. "IKN-CF: An Approach to Identify Key Nodes in Inter-Domain Routing Systems Based on Cascading Failures." Entropy 23, no. 11 (2021): 1456. http://dx.doi.org/10.3390/e23111456.
Full textKalogeraki, Eleni-Maria, Spyridon Papastergiou, and Themis Panayiotopoulos. "An Attack Simulation and Evidence Chains Generation Model for Critical Information Infrastructures." Electronics 11, no. 3 (2022): 404. http://dx.doi.org/10.3390/electronics11030404.
Full textH., Manjunath, and Saravana Kumar. "Network Intrusion Detection System using Convolution Recurrent Neural Networks and NSL-KDD Dataset." Fusion: Practice and Applications 13, no. 1 (2023): 117–25. http://dx.doi.org/10.54216/fpa.130109.
Full textBlanco-Gandía, Maria C., José Miñarro, and Marta Rodríguez-Arias. "Common Neural Mechanisms of Palatable Food Intake and Drug Abuse: Knowledge Obtained with Animal Models." Current Pharmaceutical Design 26, no. 20 (2020): 2372–84. http://dx.doi.org/10.2174/1381612826666200213123608.
Full textMarcu, Gabriela Mariana, Ana Maria Radu, Mihaela Dana Bucuță, et al. "Cognitive and Behavioral Factors Predicting the Decision to Vaccinate against COVID-19 in Clinical Psychiatric Population—A Cross-Sectional Survey." Vaccines 11, no. 2 (2023): 441. http://dx.doi.org/10.3390/vaccines11020441.
Full textvan Dongen, Laura H., Peter P. Harms, Mark Hoogendoorn, et al. "Discovery of predictors of sudden cardiac arrest in diabetes: rationale and outline of the RESCUED (REcognition of Sudden Cardiac arrest vUlnErability in Diabetes) project." Open Heart 8, no. 1 (2021): e001554. http://dx.doi.org/10.1136/openhrt-2020-001554.
Full textPrabowo, Satria Bagus, Rizki Wulandari, Intan Andriani Putri, Edlyn Yoadan Nathania, Purwaditya Nugraha, and Yogi Y. Ch Sitio. "Assessment of Seismic Vulnerability and Shear Wave Velocity Estimation Using the Horizontal-to-Vertical Spectral Ratio (HVSR) Method in Umbul Niti Geothermal Manifestations, Jatimulyo Village, South Lampung." IOP Conference Series: Earth and Environmental Science 1458, no. 1 (2025): 012024. https://doi.org/10.1088/1755-1315/1458/1/012024.
Full textKolawole, Oyebamiji Abel, Akintelu Sunday Adewale, Simon N. Odoemene, Oyeneyin Oluwatoba Emmanuel, and Semire Banjo. "Theoretical Bioevaluation of 1,2,4-Thiadiazole-1,2,4-triazole Derivatives via Molecular Modelling Approach." Asian Journal of Organic & Medicinal Chemistry 6, no. 1 (2021): 40–46. http://dx.doi.org/10.14233/ajomc.2021.ajomc-p307.
Full textRichardson, David E., Katrin E. Marancik, Jeffrey R. Guyon, et al. "Discovery of a spawning ground reveals diverse migration strategies in Atlantic bluefin tuna (Thunnus thynnus)." Proceedings of the National Academy of Sciences 113, no. 12 (2016): 3299–304. http://dx.doi.org/10.1073/pnas.1525636113.
Full textMofleh, Dania, Maha Almohamad, Ikponmwosa Osaghae, et al. "Spatial Patterns of COVID-19 Vaccination Coverage by Social Vulnerability Index and Designated COVID-19 Vaccine Sites in Texas." Vaccines 10, no. 4 (2022): 574. http://dx.doi.org/10.3390/vaccines10040574.
Full textLin, Mingmin, Yingpei Zeng, and Yang Li. "RegFuzz: A Linear Regression-Based Approach for Seed Scheduling in Directed Fuzzing." Electronics 12, no. 17 (2023): 3650. http://dx.doi.org/10.3390/electronics12173650.
Full textKieliszek, Agata M., Daniel Mobilio, Blessing I. Bassey-Archibong, et al. "Abstract 2474: Uncovering a new therapeutic vulnerability for preventing brain metastases." Cancer Research 83, no. 7_Supplement (2023): 2474. http://dx.doi.org/10.1158/1538-7445.am2023-2474.
Full textSyafitri, Faizah, Aris Munandar, and Rayuna Handawati. "PENGARUH MODEL PEMBELAJARAN DISCOVERY LEARNING PADA MATERI PERSEBARAN WILAYAH RAWAN BENCANA ALAM DI INDONESIA TERHADAP KEMAMPUAN BERPIKIR SPASIAL PESERTA DIDIK." GEOGRAPHY : Jurnal Kajian, Penelitian dan Pengembangan Pendidikan 11, no. 2 (2023): 288. http://dx.doi.org/10.31764/geography.v11i2.15748.
Full textNihar, Malali. "THE ROLE OF DEVSECOPS IN FINANCIAL AI MODELS: INTEGRATING SECURITY AT EVERY STAGE OF AI/ML MODEL DEVELOPMENT IN BANKING AND INSURANCE." International Journal of Engineering Technology Research & Management (IJETRM) 06, no. 11 (2022): 218–25. https://doi.org/10.5281/zenodo.15239176.
Full textNaeem, Muhammad Rehan, Rashid Amin, Muhammad Farhan, Faisal S. Alsubaei, Eesa Alsolami, and Muhammad D. Zakaria. "Cyber security Enhancements with reinforcement learning: A zero-day vulnerabilityu identification perspective." PLOS One 20, no. 5 (2025): e0324595. https://doi.org/10.1371/journal.pone.0324595.
Full text