搜索vulnerability共有 18 个结果
1
Algorithm of key branch exploration and hotspot update for software vulnerability fuzzy testing
Accepted Paper
2024年第7期 :
doi:10.19734/j.issn.1001-3695.2023.11.0508
2
Intermediate language representation for vulnerability detection
2023年第11期 : 3377-3381,3393
doi:10.19734/j.issn.1001-3695.2023.03.0119
3
Survey of network protocol fuzzing
2023年第8期 : 2241-2249
doi:10.19734/j.issn.1001-3695.2022.12.0794
4
Kernel driver vulnerability mining based on fitness and input constraint model
2023年第7期 : 2151-2156
doi:10.19734/j.issn.1001-3695.2022.11.0772
5
Cold start method for source code vulnerability detection model based on improved differential evolution algorithm
2023年第7期 : 2170-2178
doi:10.19734/j.issn.1001-3695.2022.11.0640
6
Evaluation of program vulnerability factor based on graph neural network
2023年第4期 : 1148-1153
doi:10.19734/j.issn.1001-3695.2022.08.0435
7
Research on DoS vulnerability optimization of blockchain auction refund transaction smart contract
2023年第2期 : 343-348
doi:10.19734/j.issn.1001-3695.2022.07.0349
8
Code vulnerability detection model based on sliding window and hash function
2021年第8期 : 2394-2400
doi:10.19734/j.issn.1001-3695.2020.10.0367
9
Research on improved symbolic execution for smart contract vulnerability detection
2021年第7期 : 1943-1946
doi:10.19734/j.issn.1001-3695.2020.10.0353
10
Hardware information flow security verification and vulnerability detection using Yosys
2021年第6期 : 1865-1869
doi:10.19734/j.issn.1001-3695.2020.05.0193
11
Fuzzy test method for industrial control protocol combining genetic algorithm
2021年第3期 : 680-684
doi:10.19734/j.issn.1001-3695.2020.03.0048
12
Quantitative vulnerability assessment method for industrial control system based on fuzzy attack-defense tree and entropy weight method
2020年第8期 : 2409-2412,2416
doi:10.19734/j.issn.1001-3695.2019.03.0088
13
Soft error vulnerability analysis and evaluation based on SimpleSim-ARM
2020年第7期 : 2054-2057,2062
doi:10.19734/j.issn.1001-3695.2019.02.0026
14
Predicting system vulnerability discovery with growth curve
2020年第7期 : 2136-2139
doi:10.19734/j.issn.1001-3695.2019.01.0017
15
Open source software vulnerability detection method based on deep clustering
2020年第4期 : 1107-1110,1114
doi:10.19734/j.issn.1001-3695.2018.09.0721
16
Vulnerability risk assessment and mitigation method combining dynamic and static features
2020年第4期 : 1161-1165
doi:10.19734/j.issn.1001-3695.2018.10.0759
17
XSS vulnerability detection technology based on EBNF and twice crawling strategy
2019年第8期 : 2458-2463
doi:10.19734/j.issn.1001-3695.2018.02.0170
18
Automatic detection and test cases generation of format string vulnerability based on symbol execution
2019年第8期 : 2464-2468
doi:10.19734/j.issn.1001-3695.2018.01.0168