An investigation of quality issues in vulnerability detection datasets

Y Guo, S Bettaieb - … IEEE European Symposium on Security and …, 2023 - ieeexplore.ieee.org
Vulnerability detection is a crucial yet challenging task in ensuring software security, and
deep learning (DL) has made significant progress in automating this process. However, a …

[HTML][HTML] A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster

A Altameem, M Al-Ma'aitah, V Kovtun… - Egyptian Informatics …, 2023 - Elsevier
The field of computer science, like its sub-field of cyber threat modelling, is rapidly evolving.
The prerequisites for key changes can be summarized as follows: cyber threats are evolving; …

A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead

Y Guo, S Bettaieb, F Casino - International Journal of Information Security, 2024 - Springer
As society's dependence on information and communication systems (ICTs) grows, so does
the necessity of guaranteeing the proper functioning and use of such systems. In this …

NoSQL document data migration strategy in the context of schema evolution

S Fedushko, R Malyi, Y Syerov, P Serdyuk - Data & Knowledge …, 2024 - Elsevier
In Agile development, one approach cannot be chosen and used all the time. Constant
updates and strategy changes are necessary. We want to show that combining several …

EnStack: An Ensemble Stacking Framework of Large Language Models for Enhanced Vulnerability Detection in Source Code

SZ Ridoy, MSH Shaon, A Cuzzocrea… - … Conference on Big …, 2024 - ieeexplore.ieee.org
Automated detection of software vulnerabilities is critical for enhancing security, yet existing
methods often struggle with the complexity and diversity of modern codebases. In this paper …

Exploring Datasets In Software Vulnerability Analysis: A Review

A Shihab, M Alanezi - 2024 4th International Conference on …, 2024 - ieeexplore.ieee.org
Computer security is a high interesting topic. Many cybercrimes have happened during the
last decade as a result of exploiting software vulnerabilities. This issue has resulted in …

Software vulnerability detection method based on code attribute graph presentation and Bi-LSTM neural network extraction

H Jiang, S Ji, C Zha, Y Liu - International Conference on …, 2024 - spiedigitallibrary.org
Nowadays, the scale of software is getting larger and more complex. The forms of
vulnerability also tend to be more diversified. Traditional vulnerability detection methods …

[PDF][PDF] Egyptian Informatics Journal

A Altameem, M Al-Ma'aitah, V Kovtun, T Altameem - 2022 - researchgate.net
abstract The field of computer science, like its sub-field of cyber threat modelling, is rapidly
evolving. The prerequisites for key changes can be summarized as follows: cyber threats are …

PENGEMBANGAN SISTEM INSPEKSI PRODUK BERBASIS WEB DAN MACRO EXCEL PADA PT DENSO MANUFACTURING INDONESIA

F MUHAMMAD BINTANG - 2023 - digilib.unila.ac.id
Penelitian ini bertujuan untuk mengembangkan sistem inspeksi produk Quality
Measurement sebagai penyimpanan dan manajemen data, guna meningkatkan efisiensi …

Unleashing Exploit-Db Data for the Automated Exploitation of Intentionally Vulnerable Docker Containers

G Perrone, SP Romano, N d'Ambrosio… - Available at SSRN … - papers.ssrn.com
Penetration Testing is a security technique used to simulate the actions of a malicious
attacker, aiming to uncover weaknesses and assess potential consequences of cyber …