Advanced search options
You searched for subject:(Vulnerability detection)
.
Showing records 1 – 30 of
37 total matches.
▼ Search Limiters
1. Hu, Yi. A Framework for Using Deep Learning to Detect Software Vulnerabilities.
Degree: Faculty of Science & Engineering, 2019, Linköping UniversityLinköping University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-164112
Subjects/Keywords: Software Vulnerability; Vulnerability Detection; Deep Learning; Neural Network; Software Engineering; Programvaruteknik
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Hu, Y. (2019). A Framework for Using Deep Learning to Detect Software Vulnerabilities. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-164112
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Hu, Yi. “A Framework for Using Deep Learning to Detect Software Vulnerabilities.” 2019. Thesis, Linköping UniversityLinköping University. Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-164112.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Hu, Yi. “A Framework for Using Deep Learning to Detect Software Vulnerabilities.” 2019. Web. 24 Jan 2021.
Vancouver:
Hu Y. A Framework for Using Deep Learning to Detect Software Vulnerabilities. [Internet] [Thesis]. Linköping UniversityLinköping University; 2019. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-164112.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Hu Y. A Framework for Using Deep Learning to Detect Software Vulnerabilities. [Thesis]. Linköping UniversityLinköping University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-164112
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Toronto
2. Farroukh, Amer. Enhancing Performance of Vulnerability-based Intrusion Detection Systems.
Degree: 2010, University of Toronto
URL: http://hdl.handle.net/1807/25574
Subjects/Keywords: Security; Intrusion Detection; Matching; MPDU; Vulnerability; Conficker; IDS; Snort; 0544; 0984
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Farroukh, A. (2010). Enhancing Performance of Vulnerability-based Intrusion Detection Systems. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/25574
Chicago Manual of Style (16th Edition):
Farroukh, Amer. “Enhancing Performance of Vulnerability-based Intrusion Detection Systems.” 2010. Masters Thesis, University of Toronto. Accessed January 24, 2021. http://hdl.handle.net/1807/25574.
MLA Handbook (7th Edition):
Farroukh, Amer. “Enhancing Performance of Vulnerability-based Intrusion Detection Systems.” 2010. Web. 24 Jan 2021.
Vancouver:
Farroukh A. Enhancing Performance of Vulnerability-based Intrusion Detection Systems. [Internet] [Masters thesis]. University of Toronto; 2010. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1807/25574.
Council of Science Editors:
Farroukh A. Enhancing Performance of Vulnerability-based Intrusion Detection Systems. [Masters Thesis]. University of Toronto; 2010. Available from: http://hdl.handle.net/1807/25574
3. Shoshitaishvili, Yan. Building a Base for Cyber-autonomy.
Degree: 2017, University of California – eScholarship, University of California
URL: http://www.escholarship.org/uc/item/2gt7v61r
Subjects/Keywords: Computer science; binary analysis; cyber autonomy; program analysis; vulnerability detection
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Shoshitaishvili, Y. (2017). Building a Base for Cyber-autonomy. (Thesis). University of California – eScholarship, University of California. Retrieved from http://www.escholarship.org/uc/item/2gt7v61r
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Shoshitaishvili, Yan. “Building a Base for Cyber-autonomy.” 2017. Thesis, University of California – eScholarship, University of California. Accessed January 24, 2021. http://www.escholarship.org/uc/item/2gt7v61r.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Shoshitaishvili, Yan. “Building a Base for Cyber-autonomy.” 2017. Web. 24 Jan 2021.
Vancouver:
Shoshitaishvili Y. Building a Base for Cyber-autonomy. [Internet] [Thesis]. University of California – eScholarship, University of California; 2017. [cited 2021 Jan 24]. Available from: http://www.escholarship.org/uc/item/2gt7v61r.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Shoshitaishvili Y. Building a Base for Cyber-autonomy. [Thesis]. University of California – eScholarship, University of California; 2017. Available from: http://www.escholarship.org/uc/item/2gt7v61r
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
KTH
4. Broström, Andreas. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands.
Degree: Computer Science and Communication (CSC), 2015, KTH
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834
Subjects/Keywords: agile; security; testing; vulnerability scanner; detection; Computer Sciences; Datavetenskap (datalogi)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Broström, A. (2015). Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Broström, Andreas. “Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands.” 2015. Thesis, KTH. Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Broström, Andreas. “Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands.” 2015. Web. 24 Jan 2021.
Vancouver:
Broström A. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands. [Internet] [Thesis]. KTH; 2015. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Broström A. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Sydney
5. Liu, Long. Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems .
Degree: 2017, University of Sydney
URL: http://hdl.handle.net/2123/17846
Subjects/Keywords: smart grid; interdependent networks; vulnerability assessment; complex networks; community detection
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Liu, L. (2017). Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/17846
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Liu, Long. “Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems .” 2017. Thesis, University of Sydney. Accessed January 24, 2021. http://hdl.handle.net/2123/17846.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Liu, Long. “Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems .” 2017. Web. 24 Jan 2021.
Vancouver:
Liu L. Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems . [Internet] [Thesis]. University of Sydney; 2017. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/2123/17846.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Liu L. Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems . [Thesis]. University of Sydney; 2017. Available from: http://hdl.handle.net/2123/17846
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Bradford
6. Munir, Rashid. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.
Degree: PhD, 2014, University of Bradford
URL: http://hdl.handle.net/10454/14251
Subjects/Keywords: 005.8; Enterprise network security; Vulnerability analysis; Security assessment; Risk; Threat detection; Common Vulnerability Scoring System (CVSS)
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Munir, R. (2014). A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. (Doctoral Dissertation). University of Bradford. Retrieved from http://hdl.handle.net/10454/14251
Chicago Manual of Style (16th Edition):
Munir, Rashid. “A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.” 2014. Doctoral Dissertation, University of Bradford. Accessed January 24, 2021. http://hdl.handle.net/10454/14251.
MLA Handbook (7th Edition):
Munir, Rashid. “A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.” 2014. Web. 24 Jan 2021.
Vancouver:
Munir R. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. [Internet] [Doctoral dissertation]. University of Bradford; 2014. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10454/14251.
Council of Science Editors:
Munir R. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. [Doctoral Dissertation]. University of Bradford; 2014. Available from: http://hdl.handle.net/10454/14251
Delft University of Technology
7. Bisesser, Dinesh (author). Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry.
Degree: 2020, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:abfa9cc8-75ba-4dd0-84ed-3ce674445c0d
Subjects/Keywords: Static Analysis; Supervised Learning; Fortify; software vulnerability detection; Classification; Code Metrics; Vulnerability Types; Granularity; Closed Source
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Bisesser, D. (. (2020). Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:abfa9cc8-75ba-4dd0-84ed-3ce674445c0d
Chicago Manual of Style (16th Edition):
Bisesser, Dinesh (author). “Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry.” 2020. Masters Thesis, Delft University of Technology. Accessed January 24, 2021. http://resolver.tudelft.nl/uuid:abfa9cc8-75ba-4dd0-84ed-3ce674445c0d.
MLA Handbook (7th Edition):
Bisesser, Dinesh (author). “Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry.” 2020. Web. 24 Jan 2021.
Vancouver:
Bisesser D(. Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://resolver.tudelft.nl/uuid:abfa9cc8-75ba-4dd0-84ed-3ce674445c0d.
Council of Science Editors:
Bisesser D(. Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:abfa9cc8-75ba-4dd0-84ed-3ce674445c0d
8. Jimenez, Willy. Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C.
Degree: Docteur es, Informatique, 2013, Evry, Institut national des télécommunications
URL: http://www.theses.fr/2013TELE0017
Subjects/Keywords: Vulnérabilité; Détection automatique; Test passif; Formalisme; Condition de détection de vulnérabilité; Template; Model checking; Vulnerability; Automatic detection; Passive testing; Formalism; Vulnerability detection condition; Template; Model checking
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Jimenez, W. (2013). Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2013TELE0017
Chicago Manual of Style (16th Edition):
Jimenez, Willy. “Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C.” 2013. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed January 24, 2021. http://www.theses.fr/2013TELE0017.
MLA Handbook (7th Edition):
Jimenez, Willy. “Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C.” 2013. Web. 24 Jan 2021.
Vancouver:
Jimenez W. Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2013. [cited 2021 Jan 24]. Available from: http://www.theses.fr/2013TELE0017.
Council of Science Editors:
Jimenez W. Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2013. Available from: http://www.theses.fr/2013TELE0017
Delft University of Technology
9. Anker, Eva (author). Runtime analysis of Android apps based on their behaviour.
Degree: 2020, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:78cf1391-4767-4027-803b-b2ad3bd583eb
Subjects/Keywords: Android; Smartphones; JNI; Apps; Call graph; Vulnerability detection; Dynamic analysis; Dynamic Binary Instrumentation
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Anker, E. (. (2020). Runtime analysis of Android apps based on their behaviour. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:78cf1391-4767-4027-803b-b2ad3bd583eb
Chicago Manual of Style (16th Edition):
Anker, Eva (author). “Runtime analysis of Android apps based on their behaviour.” 2020. Masters Thesis, Delft University of Technology. Accessed January 24, 2021. http://resolver.tudelft.nl/uuid:78cf1391-4767-4027-803b-b2ad3bd583eb.
MLA Handbook (7th Edition):
Anker, Eva (author). “Runtime analysis of Android apps based on their behaviour.” 2020. Web. 24 Jan 2021.
Vancouver:
Anker E(. Runtime analysis of Android apps based on their behaviour. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://resolver.tudelft.nl/uuid:78cf1391-4767-4027-803b-b2ad3bd583eb.
Council of Science Editors:
Anker E(. Runtime analysis of Android apps based on their behaviour. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:78cf1391-4767-4027-803b-b2ad3bd583eb
Brno University of Technology
10. Krkoš, Radko. Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network.
Degree: 2018, Brno University of Technology
URL: http://hdl.handle.net/11012/17580
Subjects/Keywords: bezpečnosť; počítač; skenovanie; bezpečnostná diera; detekcia; aplikácia; software; security; computer; scanning; vulnerability; detection; application; software
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Krkoš, R. (2018). Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/17580
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Krkoš, Radko. “Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network.” 2018. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/17580.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Krkoš, Radko. “Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network.” 2018. Web. 24 Jan 2021.
Vancouver:
Krkoš R. Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/17580.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Krkoš R. Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/17580
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Brno University of Technology
11. Janček, Matej. Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability.
Degree: 2020, Brno University of Technology
URL: http://hdl.handle.net/11012/194955
Subjects/Keywords: bluetooth; blueborne; android; zraniteľnosť; detekcia; bezpečnosť; bluetooth; blueborne; android; vulnerability; detection; security
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Janček, M. (2020). Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/194955
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Janček, Matej. “Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability.” 2020. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/194955.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Janček, Matej. “Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability.” 2020. Web. 24 Jan 2021.
Vancouver:
Janček M. Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/194955.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Janček M. Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/194955
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Delft University of Technology
12. Man, K.W. (author). Predicting software vulnerabilities with unsupervised learning techniques.
Degree: 2020, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:80c1b078-b8ca-4c29-b0ba-866fdc5f656b
Subjects/Keywords: k-means; unsupervised learning; software fault prediction; software vulnerability detection; k-nearest neighbors; Fortify; anomaly detection; clustering
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Man, K. W. (. (2020). Predicting software vulnerabilities with unsupervised learning techniques. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:80c1b078-b8ca-4c29-b0ba-866fdc5f656b
Chicago Manual of Style (16th Edition):
Man, K W (author). “Predicting software vulnerabilities with unsupervised learning techniques.” 2020. Masters Thesis, Delft University of Technology. Accessed January 24, 2021. http://resolver.tudelft.nl/uuid:80c1b078-b8ca-4c29-b0ba-866fdc5f656b.
MLA Handbook (7th Edition):
Man, K W (author). “Predicting software vulnerabilities with unsupervised learning techniques.” 2020. Web. 24 Jan 2021.
Vancouver:
Man KW(. Predicting software vulnerabilities with unsupervised learning techniques. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://resolver.tudelft.nl/uuid:80c1b078-b8ca-4c29-b0ba-866fdc5f656b.
Council of Science Editors:
Man KW(. Predicting software vulnerabilities with unsupervised learning techniques. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:80c1b078-b8ca-4c29-b0ba-866fdc5f656b
13. Stijnen, M.M.N. Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme.
Degree: 2015, Datawyse / Universitaire Pers Maastricht
URL: https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8
;
urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8
;
45625e9f-ff65-4c43-bd0f-31d271e61dc8
;
urn:isbn:9789461593924
;
urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8
;
https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8
Subjects/Keywords: elderly care; vulnerability; early detection; primary care
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Stijnen, M. M. N. (2015). Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme. (Doctoral Dissertation). Datawyse / Universitaire Pers Maastricht. Retrieved from https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; 45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:isbn:9789461593924 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8
Chicago Manual of Style (16th Edition):
Stijnen, M M N. “Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme.” 2015. Doctoral Dissertation, Datawyse / Universitaire Pers Maastricht. Accessed January 24, 2021. https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; 45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:isbn:9789461593924 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8.
MLA Handbook (7th Edition):
Stijnen, M M N. “Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme.” 2015. Web. 24 Jan 2021.
Vancouver:
Stijnen MMN. Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme. [Internet] [Doctoral dissertation]. Datawyse / Universitaire Pers Maastricht; 2015. [cited 2021 Jan 24]. Available from: https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; 45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:isbn:9789461593924 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8.
Council of Science Editors:
Stijnen MMN. Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme. [Doctoral Dissertation]. Datawyse / Universitaire Pers Maastricht; 2015. Available from: https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; 45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:isbn:9789461593924 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8
Brno University of Technology
14. Koláček, František. Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection.
Degree: 2018, Brno University of Technology
URL: http://hdl.handle.net/11012/52361
Subjects/Keywords: web; bezpečnost; detekce zranitelností; revok; wivet; wavsep; jenkins; web; security; vulnerability detection; revok; wivet; wavsep; jenkins
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Koláček, F. (2018). Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/52361
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Koláček, František. “Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection.” 2018. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/52361.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Koláček, František. “Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection.” 2018. Web. 24 Jan 2021.
Vancouver:
Koláček F. Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/52361.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Koláček F. Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/52361
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
15. Thresiamma K. George; Dr. K. Poulose Jacob; Dr. Rekha K. James. Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack.
Degree: 2017, Cochin University of Science and Technology
URL: http://dyuthi.cusat.ac.in/purl/5355
Subjects/Keywords: Security Vulnerability; Multilevel Template Based Detection Framework; Reconstruction Framework
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
James, T. K. G. D. K. P. J. D. R. K. (2017). Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack. (Thesis). Cochin University of Science and Technology. Retrieved from http://dyuthi.cusat.ac.in/purl/5355
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
James, Thresiamma K. George; Dr. K. Poulose Jacob; Dr. Rekha K.. “Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack.” 2017. Thesis, Cochin University of Science and Technology. Accessed January 24, 2021. http://dyuthi.cusat.ac.in/purl/5355.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
James, Thresiamma K. George; Dr. K. Poulose Jacob; Dr. Rekha K.. “Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack.” 2017. Web. 24 Jan 2021.
Vancouver:
James TKGDKPJDRK. Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack. [Internet] [Thesis]. Cochin University of Science and Technology; 2017. [cited 2021 Jan 24]. Available from: http://dyuthi.cusat.ac.in/purl/5355.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
James TKGDKPJDRK. Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack. [Thesis]. Cochin University of Science and Technology; 2017. Available from: http://dyuthi.cusat.ac.in/purl/5355
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Iowa State University
16. Pham, Nam Hoai. Detection of recurring software vulnerabilities.
Degree: 2010, Iowa State University
URL: https://lib.dr.iastate.edu/etd/11590
Subjects/Keywords: Detection; Recurring; Software Vulnerability; Electrical and Computer Engineering
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Pham, N. H. (2010). Detection of recurring software vulnerabilities. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/11590
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Pham, Nam Hoai. “Detection of recurring software vulnerabilities.” 2010. Thesis, Iowa State University. Accessed January 24, 2021. https://lib.dr.iastate.edu/etd/11590.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Pham, Nam Hoai. “Detection of recurring software vulnerabilities.” 2010. Web. 24 Jan 2021.
Vancouver:
Pham NH. Detection of recurring software vulnerabilities. [Internet] [Thesis]. Iowa State University; 2010. [cited 2021 Jan 24]. Available from: https://lib.dr.iastate.edu/etd/11590.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Pham NH. Detection of recurring software vulnerabilities. [Thesis]. Iowa State University; 2010. Available from: https://lib.dr.iastate.edu/etd/11590
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
17. Irolla, Paul. Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D.
Degree: Docteur es, Recherche clinique, innovation technologique, santé publique, 2018, Université Paris-Saclay (ComUE)
URL: http://www.theses.fr/2018SACLS585
Subjects/Keywords: Détection de malware Android; Vulnérabilité; Data mining; Apprentissage artificiel; Séquence; Android malware detection,; Vulnerability; Data mining; Machine learning; Sequence
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Irolla, P. (2018). Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D. (Doctoral Dissertation). Université Paris-Saclay (ComUE). Retrieved from http://www.theses.fr/2018SACLS585
Chicago Manual of Style (16th Edition):
Irolla, Paul. “Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D.” 2018. Doctoral Dissertation, Université Paris-Saclay (ComUE). Accessed January 24, 2021. http://www.theses.fr/2018SACLS585.
MLA Handbook (7th Edition):
Irolla, Paul. “Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D.” 2018. Web. 24 Jan 2021.
Vancouver:
Irolla P. Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D. [Internet] [Doctoral dissertation]. Université Paris-Saclay (ComUE); 2018. [cited 2021 Jan 24]. Available from: http://www.theses.fr/2018SACLS585.
Council of Science Editors:
Irolla P. Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D. [Doctoral Dissertation]. Université Paris-Saclay (ComUE); 2018. Available from: http://www.theses.fr/2018SACLS585
18. Dewey, David Bryan. Finding and remedying high-level security issues in binary code.
Degree: PhD, Computer Science, 2015, Georgia Tech
URL: http://hdl.handle.net/1853/54338
Subjects/Keywords: Security; Static analysis; Binary decompilation; Vulnerability detection
…PROP_ENTRY_* macros and PROP_DATA_ENTRY 87 . . . . . . . 88 type confusion vulnerability… …Instantiation 63 Sample C++ code with a use-after-free vulnerability… …vulnerability is possible… …vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 67 AODA… …results detect use of an object that is not in the previously-disclosed vulnerability 68 AV…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Dewey, D. B. (2015). Finding and remedying high-level security issues in binary code. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54338
Chicago Manual of Style (16th Edition):
Dewey, David Bryan. “Finding and remedying high-level security issues in binary code.” 2015. Doctoral Dissertation, Georgia Tech. Accessed January 24, 2021. http://hdl.handle.net/1853/54338.
MLA Handbook (7th Edition):
Dewey, David Bryan. “Finding and remedying high-level security issues in binary code.” 2015. Web. 24 Jan 2021.
Vancouver:
Dewey DB. Finding and remedying high-level security issues in binary code. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1853/54338.
Council of Science Editors:
Dewey DB. Finding and remedying high-level security issues in binary code. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54338
19. Jafri, Nisrine. Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle.
Degree: Docteur es, Informatique, 2019, Rennes 1
URL: http://www.theses.fr/2019REN1S014
Subjects/Keywords: Injection de faute; Détection de vulnérabilité; Model checking; Méthodes formelles; Fault Injection; Vulnerability Detection; Model Checking; Formal Methods
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Jafri, N. (2019). Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle. (Doctoral Dissertation). Rennes 1. Retrieved from http://www.theses.fr/2019REN1S014
Chicago Manual of Style (16th Edition):
Jafri, Nisrine. “Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle.” 2019. Doctoral Dissertation, Rennes 1. Accessed January 24, 2021. http://www.theses.fr/2019REN1S014.
MLA Handbook (7th Edition):
Jafri, Nisrine. “Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle.” 2019. Web. 24 Jan 2021.
Vancouver:
Jafri N. Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle. [Internet] [Doctoral dissertation]. Rennes 1; 2019. [cited 2021 Jan 24]. Available from: http://www.theses.fr/2019REN1S014.
Council of Science Editors:
Jafri N. Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle. [Doctoral Dissertation]. Rennes 1; 2019. Available from: http://www.theses.fr/2019REN1S014
20. 小菅, 祐史. A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究.
Degree: 2011, Keio University / 慶應義塾大学
URL: http://koara.lib.keio.ac.jp/xoonips/modules/xoonips/detail.php?koara_id=KO50002002-00002011-0028
Subjects/Keywords: セキュリティ; Webアプリケーション; 脆弱性検出; Security; Web Application; Vulnerability Detection
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
小菅, . (2011). A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究. (Thesis). Keio University / 慶應義塾大学. Retrieved from http://koara.lib.keio.ac.jp/xoonips/modules/xoonips/detail.php?koara_id=KO50002002-00002011-0028
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
小菅, 祐史. “A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究.” 2011. Thesis, Keio University / 慶應義塾大学. Accessed January 24, 2021. http://koara.lib.keio.ac.jp/xoonips/modules/xoonips/detail.php?koara_id=KO50002002-00002011-0028.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
小菅, 祐史. “A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究.” 2011. Web. 24 Jan 2021.
Vancouver:
小菅 . A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究. [Internet] [Thesis]. Keio University / 慶應義塾大学; 2011. [cited 2021 Jan 24]. Available from: http://koara.lib.keio.ac.jp/xoonips/modules/xoonips/detail.php?koara_id=KO50002002-00002011-0028.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
小菅 . A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究. [Thesis]. Keio University / 慶應義塾大学; 2011. Available from: http://koara.lib.keio.ac.jp/xoonips/modules/xoonips/detail.php?koara_id=KO50002002-00002011-0028
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
21. Gao, Wei. Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks.
Degree: PhD, Electrical and Computer Engineering, 2013, Mississippi State University
URL: http://sun.library.msstate.edu/ETD-db/theses/available/etd-09232013-205355/
;
Subjects/Keywords: Network Security; Dataset; Vulnerability; SCADA; : Intrusion detection system
…16 Intrusion Detection System… …20 SCADA-Specific Intrusion Detection… …79 V. SCADA NETWORK INTRUSION DETECTION .........................................95… …Anomaly Based Intrusion Detection Result .....................................................97… …Signature Based Intrusion Detection Result ..................................................105…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Gao, W. (2013). Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-09232013-205355/ ;
Chicago Manual of Style (16th Edition):
Gao, Wei. “Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks.” 2013. Doctoral Dissertation, Mississippi State University. Accessed January 24, 2021. http://sun.library.msstate.edu/ETD-db/theses/available/etd-09232013-205355/ ;.
MLA Handbook (7th Edition):
Gao, Wei. “Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks.” 2013. Web. 24 Jan 2021.
Vancouver:
Gao W. Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2021 Jan 24]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-09232013-205355/ ;.
Council of Science Editors:
Gao W. Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-09232013-205355/ ;
22. Akrout, Rim. Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment.
Degree: Docteur es, Informatique, 2012, Toulouse, INSA
URL: http://www.theses.fr/2012ISAT0031
Subjects/Keywords: Système de détection d’intrusions; Scanner Web; Application Web; Attaque et vulnérabilités; Évaluation; Web vulnerability scanners; Web applications; Web attacks; Vulnerabilities; Evaluation; Ntrusion detection System; 005
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Akrout, R. (2012). Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment. (Doctoral Dissertation). Toulouse, INSA. Retrieved from http://www.theses.fr/2012ISAT0031
Chicago Manual of Style (16th Edition):
Akrout, Rim. “Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment.” 2012. Doctoral Dissertation, Toulouse, INSA. Accessed January 24, 2021. http://www.theses.fr/2012ISAT0031.
MLA Handbook (7th Edition):
Akrout, Rim. “Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment.” 2012. Web. 24 Jan 2021.
Vancouver:
Akrout R. Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment. [Internet] [Doctoral dissertation]. Toulouse, INSA; 2012. [cited 2021 Jan 24]. Available from: http://www.theses.fr/2012ISAT0031.
Council of Science Editors:
Akrout R. Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment. [Doctoral Dissertation]. Toulouse, INSA; 2012. Available from: http://www.theses.fr/2012ISAT0031
Université du Luxembourg
23. Thome, Julian. A Scalable and Accurate Hybrid Vulnerability Analysis Framework.
Degree: 2018, Université du Luxembourg
URL: http://orbilu.uni.lu/handle/10993/35504
Subjects/Keywords: vulnerability detection; string constraint solving; security auditing; static analysis; search-based software engineering; Engineering, computing & technology :: Computer science [C05]; Ingénierie, informatique & technologie :: Sciences informatiques [C05]
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Thome, J. (2018). A Scalable and Accurate Hybrid Vulnerability Analysis Framework. (Doctoral Dissertation). Université du Luxembourg. Retrieved from http://orbilu.uni.lu/handle/10993/35504
Chicago Manual of Style (16th Edition):
Thome, Julian. “A Scalable and Accurate Hybrid Vulnerability Analysis Framework.” 2018. Doctoral Dissertation, Université du Luxembourg. Accessed January 24, 2021. http://orbilu.uni.lu/handle/10993/35504.
MLA Handbook (7th Edition):
Thome, Julian. “A Scalable and Accurate Hybrid Vulnerability Analysis Framework.” 2018. Web. 24 Jan 2021.
Vancouver:
Thome J. A Scalable and Accurate Hybrid Vulnerability Analysis Framework. [Internet] [Doctoral dissertation]. Université du Luxembourg; 2018. [cited 2021 Jan 24]. Available from: http://orbilu.uni.lu/handle/10993/35504.
Council of Science Editors:
Thome J. A Scalable and Accurate Hybrid Vulnerability Analysis Framework. [Doctoral Dissertation]. Université du Luxembourg; 2018. Available from: http://orbilu.uni.lu/handle/10993/35504
University of Washington
24. Ogunnaike, Ruth Motunrayo. VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES.
Degree: 2017, University of Washington
URL: http://hdl.handle.net/1773/39894
Subjects/Keywords: Internet of Things (IoT); IoT Security; OpenFlow; Software Defined Networking(SDN); Vulnerability Detection and Resolution; Computer science; Information technology; Computer engineering; Computer and software systems
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Ogunnaike, R. M. (2017). VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES. (Thesis). University of Washington. Retrieved from http://hdl.handle.net/1773/39894
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ogunnaike, Ruth Motunrayo. “VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES.” 2017. Thesis, University of Washington. Accessed January 24, 2021. http://hdl.handle.net/1773/39894.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ogunnaike, Ruth Motunrayo. “VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES.” 2017. Web. 24 Jan 2021.
Vancouver:
Ogunnaike RM. VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES. [Internet] [Thesis]. University of Washington; 2017. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1773/39894.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ogunnaike RM. VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES. [Thesis]. University of Washington; 2017. Available from: http://hdl.handle.net/1773/39894
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
University of Western Ontario
25. Ning, Xirong. Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems.
Degree: 2019, University of Western Ontario
URL: https://ir.lib.uwo.ca/etd/6248
Subjects/Keywords: cyber-physical system security; vulnerability analysis; insider attacks; cross-layered detection; attack-resilient control; security assessment platform; Controls and Control Theory; Systems and Communications
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Ning, X. (2019). Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/6248
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ning, Xirong. “Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems.” 2019. Thesis, University of Western Ontario. Accessed January 24, 2021. https://ir.lib.uwo.ca/etd/6248.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ning, Xirong. “Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems.” 2019. Web. 24 Jan 2021.
Vancouver:
Ning X. Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems. [Internet] [Thesis]. University of Western Ontario; 2019. [cited 2021 Jan 24]. Available from: https://ir.lib.uwo.ca/etd/6248.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ning X. Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems. [Thesis]. University of Western Ontario; 2019. Available from: https://ir.lib.uwo.ca/etd/6248
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Georgia Tech
26. Duan, Ruian. Toward solving the security risks of open-source software use.
Degree: PhD, Computer Science, 2019, Georgia Tech
URL: http://hdl.handle.net/1853/62316
Subjects/Keywords: Open source software; Application security; License violation; Code clone detection; Known vulnerability; Patching; Supply chain attack; Package manager; Web security; Runtime protection; Runtime isolation
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Duan, R. (2019). Toward solving the security risks of open-source software use. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62316
Chicago Manual of Style (16th Edition):
Duan, Ruian. “Toward solving the security risks of open-source software use.” 2019. Doctoral Dissertation, Georgia Tech. Accessed January 24, 2021. http://hdl.handle.net/1853/62316.
MLA Handbook (7th Edition):
Duan, Ruian. “Toward solving the security risks of open-source software use.” 2019. Web. 24 Jan 2021.
Vancouver:
Duan R. Toward solving the security risks of open-source software use. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1853/62316.
Council of Science Editors:
Duan R. Toward solving the security risks of open-source software use. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62316
Virginia Tech
27. Shelly, David Andrew. Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners.
Degree: MS, Electrical and Computer Engineering, 2010, Virginia Tech
URL: http://hdl.handle.net/10919/34464
Subjects/Keywords: Vulnerability Detection; Web Application Scanners; Web Application Security; Black Box Testing
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Shelly, D. A. (2010). Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/34464
Chicago Manual of Style (16th Edition):
Shelly, David Andrew. “Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners.” 2010. Masters Thesis, Virginia Tech. Accessed January 24, 2021. http://hdl.handle.net/10919/34464.
MLA Handbook (7th Edition):
Shelly, David Andrew. “Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners.” 2010. Web. 24 Jan 2021.
Vancouver:
Shelly DA. Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners. [Internet] [Masters thesis]. Virginia Tech; 2010. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10919/34464.
Council of Science Editors:
Shelly DA. Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners. [Masters Thesis]. Virginia Tech; 2010. Available from: http://hdl.handle.net/10919/34464
28. -2178-1988. Program analysis techniques for algorithmic complexity and relational properties.
Degree: PhD, Computer Science, 2019, University of Texas – Austin
URL: http://dx.doi.org/10.26153/tsw/2181
Subjects/Keywords: Complexity testing; Optimal program synthesis; Fuzzing; Genetic programming; Performance bug; Vulnerability detection; Side channel; Static analysis; Relational verification; Reinforcement learning; Policy gradient
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
-2178-1988. (2019). Program analysis techniques for algorithmic complexity and relational properties. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/2181
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Chicago Manual of Style (16th Edition):
-2178-1988. “Program analysis techniques for algorithmic complexity and relational properties.” 2019. Doctoral Dissertation, University of Texas – Austin. Accessed January 24, 2021. http://dx.doi.org/10.26153/tsw/2181.
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
MLA Handbook (7th Edition):
-2178-1988. “Program analysis techniques for algorithmic complexity and relational properties.” 2019. Web. 24 Jan 2021.
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Vancouver:
-2178-1988. Program analysis techniques for algorithmic complexity and relational properties. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2019. [cited 2021 Jan 24]. Available from: http://dx.doi.org/10.26153/tsw/2181.
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Council of Science Editors:
-2178-1988. Program analysis techniques for algorithmic complexity and relational properties. [Doctoral Dissertation]. University of Texas – Austin; 2019. Available from: http://dx.doi.org/10.26153/tsw/2181
Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Delft University of Technology
29. Pan, K. Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection.
Degree: 2020, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507
;
urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507
;
4b4f9f96-237e-421b-82f4-97b1393ae507
;
10.4233/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507
;
urn:isbn:978-94-028-1975-5
;
urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507
;
http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507
Subjects/Keywords: combined attacks; disruptive multivariate intrusions; vulnerability assessment; cyber risk analysis; robust attack detection
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Pan, K. (2020). Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection. (Doctoral Dissertation). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; 4b4f9f96-237e-421b-82f4-97b1393ae507 ; 10.4233/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:isbn:978-94-028-1975-5 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507
Chicago Manual of Style (16th Edition):
Pan, K. “Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection.” 2020. Doctoral Dissertation, Delft University of Technology. Accessed January 24, 2021. http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; 4b4f9f96-237e-421b-82f4-97b1393ae507 ; 10.4233/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:isbn:978-94-028-1975-5 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507.
MLA Handbook (7th Edition):
Pan, K. “Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection.” 2020. Web. 24 Jan 2021.
Vancouver:
Pan K. Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection. [Internet] [Doctoral dissertation]. Delft University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; 4b4f9f96-237e-421b-82f4-97b1393ae507 ; 10.4233/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:isbn:978-94-028-1975-5 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507.
Council of Science Editors:
Pan K. Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection. [Doctoral Dissertation]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; 4b4f9f96-237e-421b-82f4-97b1393ae507 ; 10.4233/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:isbn:978-94-028-1975-5 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507
30. Jia, Yunhan. Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms.
Degree: PhD, Computer Science & Engineering, 2018, University of Michigan
URL: http://hdl.handle.net/2027.42/145845
Subjects/Keywords: Program analysis; Vulnerability detection; Software quality assurance; Malware detection; Internet of Things; Application security; Computer Science; Engineering
…potential vulnerability. V1 :sensitive data leakage, V2 : privileged remote execution, V3 : DoS… …x28;ContexIoT) to strengthen the platform’s immunity to the vulnerability and malice in… …third-party software. Concretely, we first study a vulnerability family caused by the open… …app development, which protects the user from vulnerability and malice in these apps through… …vulnerability embedded in its 4G/LTE modem, whose compromise would put the vehicle in a situation…
Record Details
Similar Records
❌
APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager
APA (6th Edition):
Jia, Y. (2018). Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/145845
Chicago Manual of Style (16th Edition):
Jia, Yunhan. “Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms.” 2018. Doctoral Dissertation, University of Michigan. Accessed January 24, 2021. http://hdl.handle.net/2027.42/145845.
MLA Handbook (7th Edition):
Jia, Yunhan. “Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms.” 2018. Web. 24 Jan 2021.
Vancouver:
Jia Y. Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms. [Internet] [Doctoral dissertation]. University of Michigan; 2018. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/2027.42/145845.
Council of Science Editors:
Jia Y. Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms. [Doctoral Dissertation]. University of Michigan; 2018. Available from: http://hdl.handle.net/2027.42/145845