Printer Friendly

Browse Software security topic

Methods subtopic


1-15 out of 15 article(s)
Title Author Type Date Words
Two Stage Deep Learning Based Stacked Ensemble Model for Web Application Security. Sevri, Mehmet; Karacan, Hacer Report Feb 1, 2022 11752
EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization. Wang, Yunchao; Wu, Zehui; Wei, Qiang; Wang, Qingxian Sep 1, 2020 7918
Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications. Shen, Limin; Li, Hui; Wang, Hongyi; Wang, Yihuan Report Jun 30, 2020 9509
Protecting Your Software Supply Chain. Blessman, Danika Jan 1, 2019 1157
Analysis of Web Browser Security Configuration Options. Jillepalli, Ananth A.; de Leon, Daniel Conte; Steiner, Stuart; Alves-Foss, Jim Report Dec 1, 2018 9313
A Practical Intent Fuzzing Tool for Robustness of Inter-Component Communication in Android Apps. Choi, Kwanghoon; Ko, Myungpil; Chang, Byeong-Mo Technical report Sep 1, 2018 10547
Forensic Investigation Technique on Android's Blackberry Messenger using NIST Framework. Riadi, Imam; Sunardi; Firdonsyah, Arizona Report Oct 1, 2017 3332
An Integrative Model of Managing Software Security During Information Systems Development. Raghavan, Vijay; Zhang, Xiaoni Report Oct 1, 2017 7527
Control flow checking at virtual edges. Liu, LiPing; Ci, LinLin; Liu, Wei; Yang, Hui Report Jan 1, 2017 8232
Advances of mobile forensic procedures in Firefox OS. Yusoff, Mohd Najwadi; Mahmod, Ramlan; Dehghantanha, Ali; Abdullah, Mohd Taufik Report Oct 1, 2014 8798
RPFuzzer: a framework for discovering router protocols vulnerabilities based on fuzzing. Wang, Zhiqiang; Zhang, Yuqing; Liu, Qixu Report Aug 1, 2013 8266
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies. Kindy, Diallo Abdoulaye; Pathan, Al-Sakib Khan Report Aug 1, 2013 7571
Security measurement based on GQM to improve application security during requirements stage. Abdulrazeg, Ala A.; Norwawi, Norita Md; Basir, Nurlida Report Jul 1, 2012 4239
Runtime monitoring technique to handle tautology based SQL injection attacks. Dharam, Ramya; Shiva, Sajjan G. Report Jul 1, 2012 6343
Is your network secure? Danger lurks everywhere, but there are plenty of things businesses can do to protect their networks. Geer, David Dec 1, 2003 1599

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |