-
1Academic Journal
المؤلفون: Jo, Arrah-Marie1 (AUTHOR) arrahmarie.jo@gmail.com
المصدر: Review of Network Economics. Dec2024, Vol. 23 Issue 4, p161-198. 38p.
مصطلحات موضوعية: *INFORMATION technology security, *COMPUTER security vulnerabilities, *FREEWARE (Computer software), INTERNET security, COMPUTER software security, SOFTWARE upgrades
-
2Academic Journal
المؤلفون: Pham, Van-Hau1,2 (AUTHOR) haupv@uit.edu.vn, Hien, Do Thi Thu1,2 (AUTHOR), Hoang, Hien Do1,2 (AUTHOR), Duy, Phan The1,2 (AUTHOR)
المصدر: International Journal of Information Security. Dec2024, Vol. 23 Issue 6, p3513-3526. 14p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *PROGRAMMING languages, *NATURAL language processing, LANGUAGE models, COMPUTER software security, SOURCE code, DEEP learning
-
3Academic Journal
المؤلفون: Guo, Yuejun1 (AUTHOR), Bettaieb, Seifeddine1 (AUTHOR), Casino, Fran2,3 (AUTHOR) franciscojose.casino@urv.cat
المصدر: International Journal of Information Security. Oct2024, Vol. 23 Issue 5, p3311-3327. 17p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *ARTIFICIAL intelligence, *TELECOMMUNICATION systems, *INFORMATION storage & retrieval systems, RESEARCH personnel
-
4Academic Journal
المؤلفون: Arıkan, Süleyman Muhammed1 (AUTHOR) suleymanmuhammed.arikan@gazi.edu.tr, Koçak, Aynur2 (AUTHOR), Alkan, Mustafa1,2 (AUTHOR)
المصدر: International Journal of Information Security. Oct2024, Vol. 23 Issue 5, p3135-3151. 17p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *CYBERTERRORISM, *RESOURCE management, MACHINE learning, CYBER intelligence (Computer security)
-
5Academic Journal
المؤلفون: Liu, Zhenhui1,2 (AUTHOR) 200126@yzpc.edu.cn
المصدر: PLoS ONE. 1/27/2025, Vol. 20 Issue 1, p1-17. 17p.
مصطلحات موضوعية: *ARTIFICIAL neural networks, *COMPUTER security vulnerabilities, *STRUCTURAL optimization, *COMPUTER performance, *FEATURE extraction
-
6Periodical
المصدر: Communications of the ACM; Feb2025, Vol. 68 Issue 2, p96-105, 10p
مصطلحات موضوعية: HUMAN-artificial intelligence interaction, COMPUTER programming, COMPUTER security vulnerabilities, PROGRAMMING languages
الشركة/الكيان: GITHUB Inc.
-
7Academic Journal
المؤلفون: Li, Peiqiang1 (AUTHOR), Wang, Guojun1 (AUTHOR) csgjwang@gzhu.edu.cn, Xing, Xiaofei1 (AUTHOR), Li, Xiangbin1 (AUTHOR), Zhu, Jinyao1 (AUTHOR)
المصدر: Connection Science. Dec2024, Vol. 36 Issue 1, p1-22. 22p.
مصطلحات موضوعية: *MACHINE learning, *COMPUTER security vulnerabilities, *SUPPORT vector machines, *K-nearest neighbor classification, *DECISION trees
-
8Periodical
المؤلفون: Bratus, Sergey1 (AUTHOR) sergey.bratus@daroa.mil
المصدر: Communications of the ACM. Dec2024, Vol. 67 Issue 12, p86-86. 1p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *COMPUTER science, *COMPUTER architecture, COMPUTER performance
-
9Academic Journal
المؤلفون: Peihua Zhang1,2, Chenggang Wu1,2,3, Zhe Wang1,3 wangzhe12@ict.ac.cn
المصدر: BenchCouncil Transactions on Benchmarks, Standards & Evaluations. Jun2024, Vol. 4 Issue 2, p1-15. 15p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *MALWARE, *DEFAULT (Finance), BINARY codes, PERSPECTIVE taking, DEEP learning
-
10Academic Journal
المؤلفون: Bhandari, Guru Prasad1 (AUTHOR) guruprasad.bhandari@kristiania.no, Assres, Gebremariam1 (AUTHOR), Gavric, Nikola1 (AUTHOR), Shalaginov, Andrii1 (AUTHOR), Grønli, Tor-Morten1 (AUTHOR)
المصدر: International Journal of Information Security. Aug2024, Vol. 23 Issue 4, p2677-2690. 14p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *NATURAL language processing, INTERNET of things, SOFTWARE architecture, MACHINE learning
-
11Academic Journal
المؤلفون: Xu, Shenglin1 (AUTHOR), Jiang, Zhiyuan1 (AUTHOR), Wang, Yongjun1 (AUTHOR), Xie, Peidai1 (AUTHOR)
المصدر: Computer Journal. Nov2024, Vol. 67 Issue 11, p3056-3066. 11p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *TOURNAMENTS, *MEMORY
-
12Periodical
المؤلفون: Garcia-Tobin, Charles, Knight, Mark
المصدر: Communications of the ACM; Oct2024, Vol. 67 Issue 10, p34-39, 6p
مصطلحات موضوعية: COMPUTING platforms, COMPUTER software, TRUST, DATA security, COMPUTER security vulnerabilities, COMPUTER security
-
13Academic Journal
المؤلفون: Gao, Xing1 (AUTHOR) xgaoseu@163.com
المصدر: Technology Analysis & Strategic Management. Mar2024, Vol. 36 Issue 3, p592-604. 13p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *OPEN source products, *COMPUTER software quality control, *TECHNOLOGICAL innovations, *MARKETING strategy, *SOFTWARE as a service, *NEAR field communication, *OPEN source software
-
14Academic Journal
المؤلفون: Breen, Megan
المصدر: Journal of the Australian & New Zealand Institute of Insurance & Finance. Jul2024, Vol. 47 Issue 2, p40-43. 4p.
مصطلحات موضوعية: Social engineering (Fraud), Contracts, Information technology, Multi-factor authentication, Computer security vulnerabilities, Enterprise resource planning
-
15Academic JournalNG_MDERANK: A software vulnerability feature knowledge extraction method based on N‐gram similarity.
المؤلفون: Wu, Xiaoxue1 (AUTHOR), Weng, Shiyu1 (AUTHOR), Zheng, Bin2 (AUTHOR), Zheng, Wei2 (AUTHOR), Chen, Xiang3 (AUTHOR), Sun, Xiaobin1 (AUTHOR) xbsun@yzu.edu.cn
المصدر: Journal of Software: Evolution & Process. Aug2024, p1. 18p. 12 Illustrations.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *COMPUTER software security, *KNOWLEDGE graphs, *FEATURE extraction, *PROBLEM solving, *DATA extraction
-
16Periodical
المؤلفون: Kern, Christoph
المصدر: Communications of the ACM; Jun2024, Vol. 67 Issue 6, p52-60, 9p
مصطلحات موضوعية: COMPUTER software developers, COMPUTER software development, DEBUGGING, COMPUTER software testing, COMPUTER software safety measures, COMPUTER security software, COMPUTER programming, COMPUTER security vulnerabilities
-
17Academic Journal
المؤلفون: Kekül, Hakan1 (AUTHOR) hakankekul@cumhuriyet.edu.tr, Ergen, Burhan2 (AUTHOR), Arslan, Halil3 (AUTHOR)
المصدر: International Journal of Information Security. Feb2024, Vol. 23 Issue 1, p247-270. 24p.
-
18Academic Journal
المؤلفون: Kang, Martin1 (AUTHOR) martin.kang@lmu.edu, Templeton, Gary2 (AUTHOR), Um, SungYong3 (AUTHOR) sungyong@nus.edu.sg
المصدر: Journal of Operations Management. Dec2023, Vol. 69 Issue 8, p1342-1370. 29p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *COMPUTER software developers, *DATABASES, *COMPUTER software development, SOFTWARE development tools
-
19Academic Journal
المؤلفون: ANDRÉ, ÉTIENNE1 eandre93430@lipn13.fr, SHUANG LIU2 liushuangcs@gmail.com, YANG LIU3 yangliu@ntu.edu.sg, CHOPPY, CHRISTINE4 christine.choppy@lipn.univ-paris13.fr, JUN SUN5 junsun@smu.edu.sg, JIN SONG DONG6 dongjs@comp.nus.edu.sg
المصدر: ACM Computing Surveys. 2023 Suppl13s, Vol. 55, p1-47. 47p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *MACHINERY, UNIFIED modeling language, FORMAL languages, NATURAL languages, SOFTWARE architecture
-
20Academic Journal
المؤلفون: Mejía-Granda, Carlos M.1 (AUTHOR) carlosmichael.mejiag@um.es, Fernández-Alemán, José L.1 (AUTHOR), Carrillo-de-Gea, Juan M.1 (AUTHOR), García-Berná, José A.1 (AUTHOR)
المصدر: Medical & Biological Engineering & Computing. Jan2024, Vol. 62 Issue 1, p257-273. 17p.
مصطلحات موضوعية: *COMPUTER security vulnerabilities, *HEALTH care industry, *ELECTRONIC health records, *DATABASES, MEDICAL software, MEDICAL equipment