Vulnerability Prioritization: An Offensive Security Approach Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22 テスト優先順位付け脆弱性分析評価手法 2022.06.22 2025.04.03 文献データベース
Attack Techniques and Threat Identification for Vulnerabilities Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22 攻撃者の行動分析脆弱性分析脆弱性検出 2022.06.22 2025.04.03 文献データベース
Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05 ロバスト性評価信頼評価モジュール脆弱性分析 2022.05.05 2025.04.03 文献データベース
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks Authors: David Hin, Andrey Kan, Huaming Chen, M. Ali Babar | Published: 2022-03-10 | Updated: 2022-03-25 グラフニューラルネットワーク深層学習手法脆弱性分析 2022.03.10 2025.04.03 文献データベース
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges Authors: Huaming Chen, M. Ali Babar | Published: 2022-01-12 | Updated: 2023-12-17 バックドア攻撃メンバーシップ推論脆弱性分析 2022.01.12 2025.04.03 文献データベース
PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan | Published: 2021-12-27 | Updated: 2022-05-24 特徴エンジニアリング脆弱性分析通信解析 2021.12.27 2025.04.03 文献データベース
Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers Authors: Therese Fehrer, Rocío Cabrera Lozoya, Antonino Sabetta, Dario Di Nucci, Damian A. Tamburri | Published: 2021-05-07 コード変更分析特徴選択手法脆弱性分析 2021.05.07 2025.04.03 文献データベース
Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction Authors: Zeki Bilgin | Published: 2021-05-07 コード変更分析トークン分布分析脆弱性分析 2021.05.07 2025.04.03 文献データベース
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06 クラス不均衡データ前処理脆弱性分析 2021.05.06 2025.04.03 文献データベース
An Overview of Laser Injection against Embedded Neural Network Models Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04 ハードウェアセキュリティ敵対的サンプルの脆弱性脆弱性分析 2021.05.04 2025.04.03 文献データベース