Z Li, D Zou, S Xu, Z Chen, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automatically detecting software vulnerabilities is an important problem that has attracted much attention from the academic research community. However, existing vulnerability …
J Zhang, L Li, G Lin, D Fang, Y Tai, J Huang - IEEE access, 2020 - ieeexplore.ieee.org
As a key service of the future 6G network, healthcare digital twin is the virtual replica of a person, which employs Internet of Things (IoT) technologies and AI-powered models to …
The use of technologies, procedures, and practices, designed to protect networks, programs, and data from attacks, damages, or unauthorized access, are called cyber security …
Y Wang, P Jia, X Peng, C Huang, J Liu - Computers & Security, 2023 - Elsevier
Static detection of security vulnerabilities in binary programs is an important research field in software supply chain security. However, existing vulnerability detection methods based on …
Abstract Cyber–Physical Systems (CPS) are developed by the integration of computational algorithms and physical components and they exist as a result of technological …
In recent years, cyber threats and malicious software attacks have been escalated on various platforms. Therefore, it has become essential to develop automated machine …
Software vulnerabilities have been posing tremendous reliability threats to the general public as well as critical infrastructures, and there have been many studies aiming to detect …
H Yan, S Luo, L Pan, Y Zhang - Computers & Security, 2021 - Elsevier
Deep learning has shown effectiveness in binary software vulnerability detection due to its outstanding feature extraction capability independent of human expert experience …
Ensuring the security of modern cyberphysical devices is the most important task of the modern world. The reason for this is that such devices can cause not only informational, but …