The smart grid (SG), regarded as the complex cyber-physical ecosystem of infrastructures, orchestrates advanced communication, computation, and control technologies to interact …
X Cheng, H Wang, J Hua, G Xu, Y Sui - ACM Transactions on Software …, 2021 - dl.acm.org
Static bug detection has shown its effectiveness in detecting well-defined memory errors, eg, memory leaks, buffer overflows, and null dereference. However, modern software systems …
Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng… - arXiv preprint arXiv …, 2018 - arxiv.org
The automatic detection of software vulnerabilities is an important research problem. However, existing solutions to this problem rely on human experts to define features and …
Z Li, D Zou, S Xu, H Jin, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The detection of software vulnerabilities (or vulnerabilities for short) is an important problem that has yet to be tackled, as manifested by the many vulnerabilities reported on a daily …
In this paper, we present a review of recent advances in wrapper feature selection techniques for attack detection and classification, applied in intrusion detection area. Due to …
Threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include improved efficiency and effectiveness in …
Z Li, D Zou, S Xu, Z Chen, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability …
D Li, Q Li - IEEE Transactions on Information Forensics and …, 2020 - ieeexplore.ieee.org
Malware remains a big threat to cyber security, calling for machine learning based malware detection. While promising, such detectors are known to be vulnerable to evasion attacks …
Decision-making in the context of organizational information security is highly dependent on various information. For information security managers, not only relevant information has to …