Attack Techniques and Threat Identification for Vulnerabilities Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22 Attacker Behavior AnalysisVulnerability AnalysisVulnerability detection 2022.06.22 2025.05.13 Literature Database
Vulnerability Detection in Open Source Software: An Introduction Authors: Stuart Millar | Published: 2022-03-06 Dynamic AnalysisVulnerability detectionStatic Analysis 2022.03.06 2025.05.13 Literature Database
Automated Security Assessment for the Internet of Things Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar | Published: 2021-09-09 Risk Assessment MethodMachine LearningVulnerability detection 2021.09.09 2025.05.13 Literature Database
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar | Published: 2021-03-23 Multi-output ModelVulnerability detectionevaluation metrics 2021.03.23 2025.05.13 Literature Database
Cyber-Attack Consequence Prediction Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-01 | Updated: 2020-12-02 Data CollectionFeature Extraction MethodVulnerability detection 2020.12.01 2025.05.13 Literature Database
Hardware-Assisted Detection of Firmware Attacks in Inverter-Based Cyberphysical Microgrids Authors: Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, Charalambos Konstantinou | Published: 2020-09-16 | Updated: 2021-04-18 Hardware DesignMalware ClassificationVulnerability detection 2020.09.16 2025.05.13 Literature Database
Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment Authors: Zahra Noury, Mahdi Rezaei | Published: 2020-06-15 | Updated: 2020-06-24 Performance EvaluationDeep Learning MethodVulnerability detection 2020.06.15 2025.05.13 Literature Database
Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection Authors: Abdallah Moubayed, Emad Aqeeli, Abdallah Shami | Published: 2020-06-08 Attack MethodFeature EngineeringVulnerability detection 2020.06.08 2025.05.13 Literature Database
Printing and Scanning Attack for Image Counter Forensics Authors: Hailey Joren, Otkrist Gupta, Dan Raviv | Published: 2020-04-27 | Updated: 2020-06-24 AlgorithmImage Feature ExtractionVulnerability detection 2020.04.27 2025.05.13 Literature Database
FTT-NAS: Discovering Fault-Tolerant Convolutional Neural Architecture Authors: Xuefei Ning, Guangjun Ge, Wenshuo Li, Zhenhua Zhu, Yin Zheng, Xiaoming Chen, Zhen Gao, Yu Wang, Huazhong Yang | Published: 2020-03-20 | Updated: 2021-04-12 RobustnessVulnerability detectionWeight Update Method 2020.03.20 2025.05.13 Literature Database