Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Vulnerability detection). Showing records 1 – 30 of 37 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters

1. Hu, Yi. A Framework for Using Deep Learning to Detect Software Vulnerabilities.

Degree: Faculty of Science & Engineering, 2019, Linköping UniversityLinköping University

  In recent years, with the rise of Internet technology, software vulnerabilities have also flooded, making the software security of enterprises or individuals seriously threatened.… (more)

Subjects/Keywords: Software Vulnerability; Vulnerability Detection; Deep Learning; Neural Network; Software Engineering; Programvaruteknik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, Y. (2019). A Framework for Using Deep Learning to Detect Software Vulnerabilities. (Thesis). Linköping UniversityLinköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-164112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hu, Yi. “A Framework for Using Deep Learning to Detect Software Vulnerabilities.” 2019. Thesis, Linköping UniversityLinköping University. Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-164112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hu, Yi. “A Framework for Using Deep Learning to Detect Software Vulnerabilities.” 2019. Web. 24 Jan 2021.

Vancouver:

Hu Y. A Framework for Using Deep Learning to Detect Software Vulnerabilities. [Internet] [Thesis]. Linköping UniversityLinköping University; 2019. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-164112.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hu Y. A Framework for Using Deep Learning to Detect Software Vulnerabilities. [Thesis]. Linköping UniversityLinköping University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-164112

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Toronto

2. Farroukh, Amer. Enhancing Performance of Vulnerability-based Intrusion Detection Systems.

Degree: 2010, University of Toronto

The accuracy of current intrusion detection systems (IDSes) is hindered by the limited capability of regular expressions (REs) to express the exact vulnerability. Recent advances… (more)

Subjects/Keywords: Security; Intrusion Detection; Matching; MPDU; Vulnerability; Conficker; IDS; Snort; 0544; 0984

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Farroukh, A. (2010). Enhancing Performance of Vulnerability-based Intrusion Detection Systems. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/25574

Chicago Manual of Style (16th Edition):

Farroukh, Amer. “Enhancing Performance of Vulnerability-based Intrusion Detection Systems.” 2010. Masters Thesis, University of Toronto. Accessed January 24, 2021. http://hdl.handle.net/1807/25574.

MLA Handbook (7th Edition):

Farroukh, Amer. “Enhancing Performance of Vulnerability-based Intrusion Detection Systems.” 2010. Web. 24 Jan 2021.

Vancouver:

Farroukh A. Enhancing Performance of Vulnerability-based Intrusion Detection Systems. [Internet] [Masters thesis]. University of Toronto; 2010. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1807/25574.

Council of Science Editors:

Farroukh A. Enhancing Performance of Vulnerability-based Intrusion Detection Systems. [Masters Thesis]. University of Toronto; 2010. Available from: http://hdl.handle.net/1807/25574

3. Shoshitaishvili, Yan. Building a Base for Cyber-autonomy.

Degree: 2017, University of California – eScholarship, University of California

 As software becomes increasingly embedded in our daily lives, it becomes more and more critical to find the vulnerabilities in this software. Worse, since the… (more)

Subjects/Keywords: Computer science; binary analysis; cyber autonomy; program analysis; vulnerability detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shoshitaishvili, Y. (2017). Building a Base for Cyber-autonomy. (Thesis). University of California – eScholarship, University of California. Retrieved from http://www.escholarship.org/uc/item/2gt7v61r

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shoshitaishvili, Yan. “Building a Base for Cyber-autonomy.” 2017. Thesis, University of California – eScholarship, University of California. Accessed January 24, 2021. http://www.escholarship.org/uc/item/2gt7v61r.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shoshitaishvili, Yan. “Building a Base for Cyber-autonomy.” 2017. Web. 24 Jan 2021.

Vancouver:

Shoshitaishvili Y. Building a Base for Cyber-autonomy. [Internet] [Thesis]. University of California – eScholarship, University of California; 2017. [cited 2021 Jan 24]. Available from: http://www.escholarship.org/uc/item/2gt7v61r.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shoshitaishvili Y. Building a Base for Cyber-autonomy. [Thesis]. University of California – eScholarship, University of California; 2017. Available from: http://www.escholarship.org/uc/item/2gt7v61r

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

4. Broström, Andreas. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands.

Degree: Computer Science and Communication (CSC), 2015, KTH

The number of vulnerabilities discovered in software has been growing fast the last few years. At the same time the Agile method has quickly… (more)

Subjects/Keywords: agile; security; testing; vulnerability scanner; detection; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Broström, A. (2015). Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Broström, Andreas. “Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands.” 2015. Thesis, KTH. Accessed January 24, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Broström, Andreas. “Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands.” 2015. Web. 24 Jan 2021.

Vancouver:

Broström A. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands. [Internet] [Thesis]. KTH; 2015. [cited 2021 Jan 24]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Broström A. Integrating Automated Security Testing in the Agile Development Process : Earlier Vulnerability Detection in an Environment with High Security Demands. [Thesis]. KTH; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Sydney

5. Liu, Long. Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems .

Degree: 2017, University of Sydney

 The future grid is different from the current system, and requires more interactions between electrical network and data communication network from the end users to… (more)

Subjects/Keywords: smart grid; interdependent networks; vulnerability assessment; complex networks; community detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, L. (2017). Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems . (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/17846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Long. “Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems .” 2017. Thesis, University of Sydney. Accessed January 24, 2021. http://hdl.handle.net/2123/17846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Long. “Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems .” 2017. Web. 24 Jan 2021.

Vancouver:

Liu L. Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems . [Internet] [Thesis]. University of Sydney; 2017. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/2123/17846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu L. Modelling and Vulnerability Assessment of Intelligent Electricity Networks as Cyber-Physical Systems . [Thesis]. University of Sydney; 2017. Available from: http://hdl.handle.net/2123/17846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Bradford

6. Munir, Rashid. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.

Degree: PhD, 2014, University of Bradford

 Cisco 2014 Annual Security Report clearly outlines the evolution of the threat landscape and the increase of the number of attacks. The UK government in… (more)

Subjects/Keywords: 005.8; Enterprise network security; Vulnerability analysis; Security assessment; Risk; Threat detection; Common Vulnerability Scoring System (CVSS)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Munir, R. (2014). A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. (Doctoral Dissertation). University of Bradford. Retrieved from http://hdl.handle.net/10454/14251

Chicago Manual of Style (16th Edition):

Munir, Rashid. “A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.” 2014. Doctoral Dissertation, University of Bradford. Accessed January 24, 2021. http://hdl.handle.net/10454/14251.

MLA Handbook (7th Edition):

Munir, Rashid. “A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats.” 2014. Web. 24 Jan 2021.

Vancouver:

Munir R. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. [Internet] [Doctoral dissertation]. University of Bradford; 2014. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10454/14251.

Council of Science Editors:

Munir R. A quantitative security assessment of modern cyber attacks : a framework for quantifying enterprise security risk level through system's vulnerability analysis by detecting known and unknown threats. [Doctoral Dissertation]. University of Bradford; 2014. Available from: http://hdl.handle.net/10454/14251


Delft University of Technology

7. Bisesser, Dinesh (author). Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry.

Degree: 2020, Delft University of Technology

An increasing digital world, comes with many benefits but unfortunately also many drawbacks. The increase of the digital world means an increase in data and… (more)

Subjects/Keywords: Static Analysis; Supervised Learning; Fortify; software vulnerability detection; Classification; Code Metrics; Vulnerability Types; Granularity; Closed Source

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bisesser, D. (. (2020). Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:abfa9cc8-75ba-4dd0-84ed-3ce674445c0d

Chicago Manual of Style (16th Edition):

Bisesser, Dinesh (author). “Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry.” 2020. Masters Thesis, Delft University of Technology. Accessed January 24, 2021. http://resolver.tudelft.nl/uuid:abfa9cc8-75ba-4dd0-84ed-3ce674445c0d.

MLA Handbook (7th Edition):

Bisesser, Dinesh (author). “Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry.” 2020. Web. 24 Jan 2021.

Vancouver:

Bisesser D(. Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://resolver.tudelft.nl/uuid:abfa9cc8-75ba-4dd0-84ed-3ce674445c0d.

Council of Science Editors:

Bisesser D(. Predicting True Vulnerabilities from Static Analyzer Warnings in Industry: An Attempt to Faster Releasing Software in Industry. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:abfa9cc8-75ba-4dd0-84ed-3ce674445c0d

8. Jimenez, Willy. Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C.

Degree: Docteur es, Informatique, 2013, Evry, Institut national des télécommunications

De manière générale, en informatique, les vulnérabilités logicielles sont définies comme des cas particuliers de fonctionnements non attendus du système menant à la dégradation des… (more)

Subjects/Keywords: Vulnérabilité; Détection automatique; Test passif; Formalisme; Condition de détection de vulnérabilité; Template; Model checking; Vulnerability; Automatic detection; Passive testing; Formalism; Vulnerability detection condition; Template; Model checking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jimenez, W. (2013). Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C. (Doctoral Dissertation). Evry, Institut national des télécommunications. Retrieved from http://www.theses.fr/2013TELE0017

Chicago Manual of Style (16th Edition):

Jimenez, Willy. “Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C.” 2013. Doctoral Dissertation, Evry, Institut national des télécommunications. Accessed January 24, 2021. http://www.theses.fr/2013TELE0017.

MLA Handbook (7th Edition):

Jimenez, Willy. “Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C.” 2013. Web. 24 Jan 2021.

Vancouver:

Jimenez W. Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C. [Internet] [Doctoral dissertation]. Evry, Institut national des télécommunications; 2013. [cited 2021 Jan 24]. Available from: http://www.theses.fr/2013TELE0017.

Council of Science Editors:

Jimenez W. Two complementary approaches to detecting vulnerabilities in C programs : Deux approches complémentaires pour la détection de vulnérabilités dans les programmes C. [Doctoral Dissertation]. Evry, Institut national des télécommunications; 2013. Available from: http://www.theses.fr/2013TELE0017


Delft University of Technology

9. Anker, Eva (author). Runtime analysis of Android apps based on their behaviour.

Degree: 2020, Delft University of Technology

 In the modern world, Smartphones are everywhere and Android is the most used operating system.  To protect these devices against malicious actions, the behaviour of… (more)

Subjects/Keywords: Android; Smartphones; JNI; Apps; Call graph; Vulnerability detection; Dynamic analysis; Dynamic Binary Instrumentation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anker, E. (. (2020). Runtime analysis of Android apps based on their behaviour. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:78cf1391-4767-4027-803b-b2ad3bd583eb

Chicago Manual of Style (16th Edition):

Anker, Eva (author). “Runtime analysis of Android apps based on their behaviour.” 2020. Masters Thesis, Delft University of Technology. Accessed January 24, 2021. http://resolver.tudelft.nl/uuid:78cf1391-4767-4027-803b-b2ad3bd583eb.

MLA Handbook (7th Edition):

Anker, Eva (author). “Runtime analysis of Android apps based on their behaviour.” 2020. Web. 24 Jan 2021.

Vancouver:

Anker E(. Runtime analysis of Android apps based on their behaviour. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://resolver.tudelft.nl/uuid:78cf1391-4767-4027-803b-b2ad3bd583eb.

Council of Science Editors:

Anker E(. Runtime analysis of Android apps based on their behaviour. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:78cf1391-4767-4027-803b-b2ad3bd583eb


Brno University of Technology

10. Krkoš, Radko. Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network.

Degree: 2018, Brno University of Technology

 This thesis concerns about computer system and network infrastructure security. It describes the topic of security holes and vulnerabilities and discusses possibilities for computer attack… (more)

Subjects/Keywords: bezpečnosť; počítač; skenovanie; bezpečnostná diera; detekcia; aplikácia; software; security; computer; scanning; vulnerability; detection; application; software

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Krkoš, R. (2018). Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/17580

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Krkoš, Radko. “Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network.” 2018. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/17580.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Krkoš, Radko. “Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network.” 2018. Web. 24 Jan 2021.

Vancouver:

Krkoš R. Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/17580.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Krkoš R. Software pro hledání zranitelných počítačů v síti: Software for seeking vulnerable computers in network. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/17580

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Brno University of Technology

11. Janček, Matej. Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability.

Degree: 2020, Brno University of Technology

 This paper deals with the development of an automatic detection method detecting Blueborne vulnerabilities in Android devices. The result is a method that is invoking… (more)

Subjects/Keywords: bluetooth; blueborne; android; zraniteľnosť; detekcia; bezpečnosť; bluetooth; blueborne; android; vulnerability; detection; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Janček, M. (2020). Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/194955

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Janček, Matej. “Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability.” 2020. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/194955.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Janček, Matej. “Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability.” 2020. Web. 24 Jan 2021.

Vancouver:

Janček M. Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability. [Internet] [Thesis]. Brno University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/194955.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Janček M. Detekce zranitelnosti ze souboru Blueborne: Detection of Blueborne Revealed Vulnerability. [Thesis]. Brno University of Technology; 2020. Available from: http://hdl.handle.net/11012/194955

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Delft University of Technology

12. Man, K.W. (author). Predicting software vulnerabilities with unsupervised learning techniques.

Degree: 2020, Delft University of Technology

 As software is produced more and more every year, software also gets exploited more. This exploitation can lead to huge monetary losses and other damages… (more)

Subjects/Keywords: k-means; unsupervised learning; software fault prediction; software vulnerability detection; k-nearest neighbors; Fortify; anomaly detection; clustering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Man, K. W. (. (2020). Predicting software vulnerabilities with unsupervised learning techniques. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:80c1b078-b8ca-4c29-b0ba-866fdc5f656b

Chicago Manual of Style (16th Edition):

Man, K W (author). “Predicting software vulnerabilities with unsupervised learning techniques.” 2020. Masters Thesis, Delft University of Technology. Accessed January 24, 2021. http://resolver.tudelft.nl/uuid:80c1b078-b8ca-4c29-b0ba-866fdc5f656b.

MLA Handbook (7th Edition):

Man, K W (author). “Predicting software vulnerabilities with unsupervised learning techniques.” 2020. Web. 24 Jan 2021.

Vancouver:

Man KW(. Predicting software vulnerabilities with unsupervised learning techniques. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://resolver.tudelft.nl/uuid:80c1b078-b8ca-4c29-b0ba-866fdc5f656b.

Council of Science Editors:

Man KW(. Predicting software vulnerabilities with unsupervised learning techniques. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:80c1b078-b8ca-4c29-b0ba-866fdc5f656b

13. Stijnen, M.M.N. Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme.

Degree: 2015, Datawyse / Universitaire Pers Maastricht

 Ensuring that the elderly can live independently at home for as long as possible is central to Dutch healthcare policy. This is pursued by [G]OUD,… (more)

Subjects/Keywords: elderly care; vulnerability; early detection; primary care

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Stijnen, M. M. N. (2015). Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme. (Doctoral Dissertation). Datawyse / Universitaire Pers Maastricht. Retrieved from https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; 45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:isbn:9789461593924 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8

Chicago Manual of Style (16th Edition):

Stijnen, M M N. “Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme.” 2015. Doctoral Dissertation, Datawyse / Universitaire Pers Maastricht. Accessed January 24, 2021. https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; 45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:isbn:9789461593924 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8.

MLA Handbook (7th Edition):

Stijnen, M M N. “Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme.” 2015. Web. 24 Jan 2021.

Vancouver:

Stijnen MMN. Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme. [Internet] [Doctoral dissertation]. Datawyse / Universitaire Pers Maastricht; 2015. [cited 2021 Jan 24]. Available from: https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; 45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:isbn:9789461593924 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8.

Council of Science Editors:

Stijnen MMN. Towards proactive care for potentially frail older people in general practice : Development, feasibility, and effectiveness of the [G]OLD preventive home visitation programme. [Doctoral Dissertation]. Datawyse / Universitaire Pers Maastricht; 2015. Available from: https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; 45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; urn:isbn:9789461593924 ; urn:nbn:nl:ui:27-45625e9f-ff65-4c43-bd0f-31d271e61dc8 ; https://cris.maastrichtuniversity.nl/en/publications/45625e9f-ff65-4c43-bd0f-31d271e61dc8


Brno University of Technology

14. Koláček, František. Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection.

Degree: 2018, Brno University of Technology

 The aim of this thesis is to analyze and compare implementation of already existing open source web application vulnerability scanners (using test suites Wivet and… (more)

Subjects/Keywords: web; bezpečnost; detekce zranitelností; revok; wivet; wavsep; jenkins; web; security; vulnerability detection; revok; wivet; wavsep; jenkins

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Koláček, F. (2018). Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/52361

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Koláček, František. “Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection.” 2018. Thesis, Brno University of Technology. Accessed January 24, 2021. http://hdl.handle.net/11012/52361.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Koláček, František. “Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection.” 2018. Web. 24 Jan 2021.

Vancouver:

Koláček F. Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection. [Internet] [Thesis]. Brno University of Technology; 2018. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/11012/52361.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Koláček F. Automatizovaná detekce zranitelnosti webových aplikací: Automated Web Application Vulnerability Detection. [Thesis]. Brno University of Technology; 2018. Available from: http://hdl.handle.net/11012/52361

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Thresiamma K. George; Dr. K. Poulose Jacob; Dr. Rekha K. James. Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack.

Degree: 2017, Cochin University of Science and Technology

Subjects/Keywords: Security Vulnerability; Multilevel Template Based Detection Framework; Reconstruction Framework

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

James, T. K. G. D. K. P. J. D. R. K. (2017). Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack. (Thesis). Cochin University of Science and Technology. Retrieved from http://dyuthi.cusat.ac.in/purl/5355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

James, Thresiamma K. George; Dr. K. Poulose Jacob; Dr. Rekha K.. “Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack.” 2017. Thesis, Cochin University of Science and Technology. Accessed January 24, 2021. http://dyuthi.cusat.ac.in/purl/5355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

James, Thresiamma K. George; Dr. K. Poulose Jacob; Dr. Rekha K.. “Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack.” 2017. Web. 24 Jan 2021.

Vancouver:

James TKGDKPJDRK. Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack. [Internet] [Thesis]. Cochin University of Science and Technology; 2017. [cited 2021 Jan 24]. Available from: http://dyuthi.cusat.ac.in/purl/5355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

James TKGDKPJDRK. Security Vulnerability in On-Line Applications: Analysis, Anomaly Detection and Prevention of Attack. [Thesis]. Cochin University of Science and Technology; 2017. Available from: http://dyuthi.cusat.ac.in/purl/5355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

16. Pham, Nam Hoai. Detection of recurring software vulnerabilities.

Degree: 2010, Iowa State University

 Software security vulnerabilities are discovered on an almost daily basis and have caused substantial damage. It is vital to be able to detect and resolve… (more)

Subjects/Keywords: Detection; Recurring; Software Vulnerability; Electrical and Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pham, N. H. (2010). Detection of recurring software vulnerabilities. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/11590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pham, Nam Hoai. “Detection of recurring software vulnerabilities.” 2010. Thesis, Iowa State University. Accessed January 24, 2021. https://lib.dr.iastate.edu/etd/11590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pham, Nam Hoai. “Detection of recurring software vulnerabilities.” 2010. Web. 24 Jan 2021.

Vancouver:

Pham NH. Detection of recurring software vulnerabilities. [Internet] [Thesis]. Iowa State University; 2010. [cited 2021 Jan 24]. Available from: https://lib.dr.iastate.edu/etd/11590.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pham NH. Detection of recurring software vulnerabilities. [Thesis]. Iowa State University; 2010. Available from: https://lib.dr.iastate.edu/etd/11590

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

17. Irolla, Paul. Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D.

Degree: Docteur es, Recherche clinique, innovation technologique, santé publique, 2018, Université Paris-Saclay (ComUE)

 Ce travail de thèse fait partie du projet 3D NeuroSecure. C'est un projet d'investissement d'avenir, qui vise à développer une solution de collaboration sécurisée pour… (more)

Subjects/Keywords: Détection de malware Android; Vulnérabilité; Data mining; Apprentissage artificiel; Séquence; Android malware detection,; Vulnerability; Data mining; Machine learning; Sequence

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Irolla, P. (2018). Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D. (Doctoral Dissertation). Université Paris-Saclay (ComUE). Retrieved from http://www.theses.fr/2018SACLS585

Chicago Manual of Style (16th Edition):

Irolla, Paul. “Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D.” 2018. Doctoral Dissertation, Université Paris-Saclay (ComUE). Accessed January 24, 2021. http://www.theses.fr/2018SACLS585.

MLA Handbook (7th Edition):

Irolla, Paul. “Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D.” 2018. Web. 24 Jan 2021.

Vancouver:

Irolla P. Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D. [Internet] [Doctoral dissertation]. Université Paris-Saclay (ComUE); 2018. [cited 2021 Jan 24]. Available from: http://www.theses.fr/2018SACLS585.

Council of Science Editors:

Irolla P. Formalization of Neural Network Applications to Secure 3D Mobile Applications : Formalisation et applications des réseaux de neurones à la sécurisation d'applications mobiles 3D. [Doctoral Dissertation]. Université Paris-Saclay (ComUE); 2018. Available from: http://www.theses.fr/2018SACLS585

18. Dewey, David Bryan. Finding and remedying high-level security issues in binary code.

Degree: PhD, Computer Science, 2015, Georgia Tech

 C++ and Microsoft's Component Object Model (COM) are examples of a high- level lan- guage and development framework that were built on top of the… (more)

Subjects/Keywords: Security; Static analysis; Binary decompilation; Vulnerability detection

…PROP_ENTRY_* macros and PROP_DATA_ENTRY 87 . . . . . . . 88 type confusion vulnerability… …Instantiation 63 Sample C++ code with a use-after-free vulnerability… …vulnerability is possible… …vulnerability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127 67 AODA… …results detect use of an object that is not in the previously-disclosed vulnerability 68 AV… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dewey, D. B. (2015). Finding and remedying high-level security issues in binary code. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/54338

Chicago Manual of Style (16th Edition):

Dewey, David Bryan. “Finding and remedying high-level security issues in binary code.” 2015. Doctoral Dissertation, Georgia Tech. Accessed January 24, 2021. http://hdl.handle.net/1853/54338.

MLA Handbook (7th Edition):

Dewey, David Bryan. “Finding and remedying high-level security issues in binary code.” 2015. Web. 24 Jan 2021.

Vancouver:

Dewey DB. Finding and remedying high-level security issues in binary code. [Internet] [Doctoral dissertation]. Georgia Tech; 2015. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1853/54338.

Council of Science Editors:

Dewey DB. Finding and remedying high-level security issues in binary code. [Doctoral Dissertation]. Georgia Tech; 2015. Available from: http://hdl.handle.net/1853/54338

19. Jafri, Nisrine. Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle.

Degree: Docteur es, Informatique, 2019, Rennes 1

L'injection de faute est une méthode bien connue pour évaluer la robustesse et détecter les vulnérabilités des systèmes. La détection des vulnérabilités créées par injection… (more)

Subjects/Keywords: Injection de faute; Détection de vulnérabilité; Model checking; Méthodes formelles; Fault Injection; Vulnerability Detection; Model Checking; Formal Methods

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jafri, N. (2019). Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle. (Doctoral Dissertation). Rennes 1. Retrieved from http://www.theses.fr/2019REN1S014

Chicago Manual of Style (16th Edition):

Jafri, Nisrine. “Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle.” 2019. Doctoral Dissertation, Rennes 1. Accessed January 24, 2021. http://www.theses.fr/2019REN1S014.

MLA Handbook (7th Edition):

Jafri, Nisrine. “Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle.” 2019. Web. 24 Jan 2021.

Vancouver:

Jafri N. Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle. [Internet] [Doctoral dissertation]. Rennes 1; 2019. [cited 2021 Jan 24]. Available from: http://www.theses.fr/2019REN1S014.

Council of Science Editors:

Jafri N. Formal fault injection vulnerability detection in binaries : a software process and hardware validation : Détection formelle de vulnérabilité créée par injection de faute au niveau binaire : un processus logiciel et une validation matérielle. [Doctoral Dissertation]. Rennes 1; 2019. Available from: http://www.theses.fr/2019REN1S014

20. 小菅, 祐史. A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究.

Degree: 2011, Keio University / 慶應義塾大学

博士学位論文 : 慶應義塾大学(工学 開放環境科学専攻), 2011.9.21平成23年度春学期 甲第3559号

Subjects/Keywords: セキュリティ; Webアプリケーション; 脆弱性検出; Security; Web Application; Vulnerability Detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

小菅, . (2011). A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究. (Thesis). Keio University / 慶應義塾大学. Retrieved from http://koara.lib.keio.ac.jp/xoonips/modules/xoonips/detail.php?koara_id=KO50002002-00002011-0028

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

小菅, 祐史. “A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究.” 2011. Thesis, Keio University / 慶應義塾大学. Accessed January 24, 2021. http://koara.lib.keio.ac.jp/xoonips/modules/xoonips/detail.php?koara_id=KO50002002-00002011-0028.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

小菅, 祐史. “A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究.” 2011. Web. 24 Jan 2021.

Vancouver:

小菅 . A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究. [Internet] [Thesis]. Keio University / 慶應義塾大学; 2011. [cited 2021 Jan 24]. Available from: http://koara.lib.keio.ac.jp/xoonips/modules/xoonips/detail.php?koara_id=KO50002002-00002011-0028.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

小菅 . A Study on Dynamic Detection of Web Application Vulnerabilities : 動的解析によるWebアプリケーションの脆弱性検出手法に関する研究. [Thesis]. Keio University / 慶應義塾大学; 2011. Available from: http://koara.lib.keio.ac.jp/xoonips/modules/xoonips/detail.php?koara_id=KO50002002-00002011-0028

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Gao, Wei. Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks.

Degree: PhD, Electrical and Computer Engineering, 2013, Mississippi State University

  Supervisory Control and Data Acquisition (SCADA) systems are computer-based process control systems that interconnect and monitor remote physical processes. There have been many real… (more)

Subjects/Keywords: Network Security; Dataset; Vulnerability; SCADA; : Intrusion detection system

…16 Intrusion Detection System… …20 SCADA-Specific Intrusion Detection… …79 V. SCADA NETWORK INTRUSION DETECTION .........................................95… …Anomaly Based Intrusion Detection Result .....................................................97… …Signature Based Intrusion Detection Result ..................................................105… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gao, W. (2013). Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks. (Doctoral Dissertation). Mississippi State University. Retrieved from http://sun.library.msstate.edu/ETD-db/theses/available/etd-09232013-205355/ ;

Chicago Manual of Style (16th Edition):

Gao, Wei. “Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks.” 2013. Doctoral Dissertation, Mississippi State University. Accessed January 24, 2021. http://sun.library.msstate.edu/ETD-db/theses/available/etd-09232013-205355/ ;.

MLA Handbook (7th Edition):

Gao, Wei. “Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks.” 2013. Web. 24 Jan 2021.

Vancouver:

Gao W. Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks. [Internet] [Doctoral dissertation]. Mississippi State University; 2013. [cited 2021 Jan 24]. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-09232013-205355/ ;.

Council of Science Editors:

Gao W. Cyber threats, attacks and intrusion detection in supervisory control and data acquisition networks. [Doctoral Dissertation]. Mississippi State University; 2013. Available from: http://sun.library.msstate.edu/ETD-db/theses/available/etd-09232013-205355/ ;

22. Akrout, Rim. Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment.

Degree: Docteur es, Informatique, 2012, Toulouse, INSA

Avec le développement croissant d’Internet, les applications Web sont devenues de plus en plus vulnérables et exposées à des attaques malveillantes pouvant porter atteinte à… (more)

Subjects/Keywords: Système de détection d’intrusions; Scanner Web; Application Web; Attaque et vulnérabilités; Évaluation; Web vulnerability scanners; Web applications; Web attacks; Vulnerabilities; Evaluation; Ntrusion detection System; 005

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Akrout, R. (2012). Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment. (Doctoral Dissertation). Toulouse, INSA. Retrieved from http://www.theses.fr/2012ISAT0031

Chicago Manual of Style (16th Edition):

Akrout, Rim. “Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment.” 2012. Doctoral Dissertation, Toulouse, INSA. Accessed January 24, 2021. http://www.theses.fr/2012ISAT0031.

MLA Handbook (7th Edition):

Akrout, Rim. “Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment.” 2012. Web. 24 Jan 2021.

Vancouver:

Akrout R. Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment. [Internet] [Doctoral dissertation]. Toulouse, INSA; 2012. [cited 2021 Jan 24]. Available from: http://www.theses.fr/2012ISAT0031.

Council of Science Editors:

Akrout R. Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. : Web applications vulnerability analysis and intrusion detection systems assessment. [Doctoral Dissertation]. Toulouse, INSA; 2012. Available from: http://www.theses.fr/2012ISAT0031


Université du Luxembourg

23. Thome, Julian. A Scalable and Accurate Hybrid Vulnerability Analysis Framework.

Degree: 2018, Université du Luxembourg

 As the Internet has become an integral part of our everyday life for activities such as e-mail, online-banking, shopping, entertainment, etc., vulnerabilities in Web software… (more)

Subjects/Keywords: vulnerability detection; string constraint solving; security auditing; static analysis; search-based software engineering; Engineering, computing & technology :: Computer science [C05]; Ingénierie, informatique & technologie :: Sciences informatiques [C05]

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Thome, J. (2018). A Scalable and Accurate Hybrid Vulnerability Analysis Framework. (Doctoral Dissertation). Université du Luxembourg. Retrieved from http://orbilu.uni.lu/handle/10993/35504

Chicago Manual of Style (16th Edition):

Thome, Julian. “A Scalable and Accurate Hybrid Vulnerability Analysis Framework.” 2018. Doctoral Dissertation, Université du Luxembourg. Accessed January 24, 2021. http://orbilu.uni.lu/handle/10993/35504.

MLA Handbook (7th Edition):

Thome, Julian. “A Scalable and Accurate Hybrid Vulnerability Analysis Framework.” 2018. Web. 24 Jan 2021.

Vancouver:

Thome J. A Scalable and Accurate Hybrid Vulnerability Analysis Framework. [Internet] [Doctoral dissertation]. Université du Luxembourg; 2018. [cited 2021 Jan 24]. Available from: http://orbilu.uni.lu/handle/10993/35504.

Council of Science Editors:

Thome J. A Scalable and Accurate Hybrid Vulnerability Analysis Framework. [Doctoral Dissertation]. Université du Luxembourg; 2018. Available from: http://orbilu.uni.lu/handle/10993/35504


University of Washington

24. Ogunnaike, Ruth Motunrayo. VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES.

Degree: 2017, University of Washington

 The use of Internet of Things (IoT) devices has grown significantly in the past decade. While IoT is expected to improve life for many by… (more)

Subjects/Keywords: Internet of Things (IoT); IoT Security; OpenFlow; Software Defined Networking(SDN); Vulnerability Detection and Resolution; Computer science; Information technology; Computer engineering; Computer and software systems

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ogunnaike, R. M. (2017). VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES. (Thesis). University of Washington. Retrieved from http://hdl.handle.net/1773/39894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ogunnaike, Ruth Motunrayo. “VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES.” 2017. Thesis, University of Washington. Accessed January 24, 2021. http://hdl.handle.net/1773/39894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ogunnaike, Ruth Motunrayo. “VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES.” 2017. Web. 24 Jan 2021.

Vancouver:

Ogunnaike RM. VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES. [Internet] [Thesis]. University of Washington; 2017. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1773/39894.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ogunnaike RM. VULNERABILITY DETECTION AND RESOLUTION IN INTERNET OF THINGS (IoT) DEVICES. [Thesis]. University of Washington; 2017. Available from: http://hdl.handle.net/1773/39894

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Ontario

25. Ning, Xirong. Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems.

Degree: 2019, University of Western Ontario

 This dissertation aims to address the security issues of insider cyber-physical attacks and provide a defense-in-depth attack-resilient control system approach for cyber-physical systems. Firstly, security… (more)

Subjects/Keywords: cyber-physical system security; vulnerability analysis; insider attacks; cross-layered detection; attack-resilient control; security assessment platform; Controls and Control Theory; Systems and Communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ning, X. (2019). Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/6248

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ning, Xirong. “Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems.” 2019. Thesis, University of Western Ontario. Accessed January 24, 2021. https://ir.lib.uwo.ca/etd/6248.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ning, Xirong. “Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems.” 2019. Web. 24 Jan 2021.

Vancouver:

Ning X. Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems. [Internet] [Thesis]. University of Western Ontario; 2019. [cited 2021 Jan 24]. Available from: https://ir.lib.uwo.ca/etd/6248.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ning X. Analysis, Design and Demonstration of Control Systems Against Insider Attacks in Cyber-Physical Systems. [Thesis]. University of Western Ontario; 2019. Available from: https://ir.lib.uwo.ca/etd/6248

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Georgia Tech

26. Duan, Ruian. Toward solving the security risks of open-source software use.

Degree: PhD, Computer Science, 2019, Georgia Tech

 Open-source software (OSS) has been widely adopted in all layers of the software stack, from operating systems to web servers and mobile apps. Despite their… (more)

Subjects/Keywords: Open source software; Application security; License violation; Code clone detection; Known vulnerability; Patching; Supply chain attack; Package manager; Web security; Runtime protection; Runtime isolation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Duan, R. (2019). Toward solving the security risks of open-source software use. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/62316

Chicago Manual of Style (16th Edition):

Duan, Ruian. “Toward solving the security risks of open-source software use.” 2019. Doctoral Dissertation, Georgia Tech. Accessed January 24, 2021. http://hdl.handle.net/1853/62316.

MLA Handbook (7th Edition):

Duan, Ruian. “Toward solving the security risks of open-source software use.” 2019. Web. 24 Jan 2021.

Vancouver:

Duan R. Toward solving the security risks of open-source software use. [Internet] [Doctoral dissertation]. Georgia Tech; 2019. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/1853/62316.

Council of Science Editors:

Duan R. Toward solving the security risks of open-source software use. [Doctoral Dissertation]. Georgia Tech; 2019. Available from: http://hdl.handle.net/1853/62316


Virginia Tech

27. Shelly, David Andrew. Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners.

Degree: MS, Electrical and Computer Engineering, 2010, Virginia Tech

 The threat of cyber attacks due to improper security is a real and evolving danger. Corporate and personal data is breached and lost because of… (more)

Subjects/Keywords: Vulnerability Detection; Web Application Scanners; Web Application Security; Black Box Testing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shelly, D. A. (2010). Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners. (Masters Thesis). Virginia Tech. Retrieved from http://hdl.handle.net/10919/34464

Chicago Manual of Style (16th Edition):

Shelly, David Andrew. “Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners.” 2010. Masters Thesis, Virginia Tech. Accessed January 24, 2021. http://hdl.handle.net/10919/34464.

MLA Handbook (7th Edition):

Shelly, David Andrew. “Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners.” 2010. Web. 24 Jan 2021.

Vancouver:

Shelly DA. Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners. [Internet] [Masters thesis]. Virginia Tech; 2010. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/10919/34464.

Council of Science Editors:

Shelly DA. Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners. [Masters Thesis]. Virginia Tech; 2010. Available from: http://hdl.handle.net/10919/34464

28. -2178-1988. Program analysis techniques for algorithmic complexity and relational properties.

Degree: PhD, Computer Science, 2019, University of Texas – Austin

 Analyzing standard safety properties of a given program has traditionally been the primary focus of the program analysis community. Unfortunately, there are still many interesting… (more)

Subjects/Keywords: Complexity testing; Optimal program synthesis; Fuzzing; Genetic programming; Performance bug; Vulnerability detection; Side channel; Static analysis; Relational verification; Reinforcement learning; Policy gradient

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-2178-1988. (2019). Program analysis techniques for algorithmic complexity and relational properties. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/2181

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-2178-1988. “Program analysis techniques for algorithmic complexity and relational properties.” 2019. Doctoral Dissertation, University of Texas – Austin. Accessed January 24, 2021. http://dx.doi.org/10.26153/tsw/2181.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-2178-1988. “Program analysis techniques for algorithmic complexity and relational properties.” 2019. Web. 24 Jan 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-2178-1988. Program analysis techniques for algorithmic complexity and relational properties. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2019. [cited 2021 Jan 24]. Available from: http://dx.doi.org/10.26153/tsw/2181.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-2178-1988. Program analysis techniques for algorithmic complexity and relational properties. [Doctoral Dissertation]. University of Texas – Austin; 2019. Available from: http://dx.doi.org/10.26153/tsw/2181

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Delft University of Technology

29. Pan, K. Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection.

Degree: 2020, Delft University of Technology

 The digital transformation of power systems has introduced a new challenge for robustness: cyber security threats. Motivated by the feasibility of a potent attack (e.g.,… (more)

Subjects/Keywords: combined attacks; disruptive multivariate intrusions; vulnerability assessment; cyber risk analysis; robust attack detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pan, K. (2020). Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection. (Doctoral Dissertation). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; 4b4f9f96-237e-421b-82f4-97b1393ae507 ; 10.4233/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:isbn:978-94-028-1975-5 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507

Chicago Manual of Style (16th Edition):

Pan, K. “Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection.” 2020. Doctoral Dissertation, Delft University of Technology. Accessed January 24, 2021. http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; 4b4f9f96-237e-421b-82f4-97b1393ae507 ; 10.4233/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:isbn:978-94-028-1975-5 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507.

MLA Handbook (7th Edition):

Pan, K. “Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection.” 2020. Web. 24 Jan 2021.

Vancouver:

Pan K. Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection. [Internet] [Doctoral dissertation]. Delft University of Technology; 2020. [cited 2021 Jan 24]. Available from: http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; 4b4f9f96-237e-421b-82f4-97b1393ae507 ; 10.4233/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:isbn:978-94-028-1975-5 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507.

Council of Science Editors:

Pan K. Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack Detection. [Doctoral Dissertation]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; 4b4f9f96-237e-421b-82f4-97b1393ae507 ; 10.4233/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; urn:isbn:978-94-028-1975-5 ; urn:NBN:nl:ui:24-uuid:4b4f9f96-237e-421b-82f4-97b1393ae507 ; http://resolver.tudelft.nl/uuid:4b4f9f96-237e-421b-82f4-97b1393ae507

30. Jia, Yunhan. Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms.

Degree: PhD, Computer Science & Engineering, 2018, University of Michigan

 Our smartphones, homes, hospitals, and automobiles are being enhanced with software that provide an unprecedentedly rich set of functionalities, which has created an enormous market… (more)

Subjects/Keywords: Program analysis; Vulnerability detection; Software quality assurance; Malware detection; Internet of Things; Application security; Computer Science; Engineering

…potential vulnerability. V1 :sensitive data leakage, V2 : privileged remote execution, V3 : DoS… …x28;ContexIoT) to strengthen the platform’s immunity to the vulnerability and malice in… …third-party software. Concretely, we first study a vulnerability family caused by the open… …app development, which protects the user from vulnerability and malice in these apps through… …vulnerability embedded in its 4G/LTE modem, whose compromise would put the vehicle in a situation… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jia, Y. (2018). Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/145845

Chicago Manual of Style (16th Edition):

Jia, Yunhan. “Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms.” 2018. Doctoral Dissertation, University of Michigan. Accessed January 24, 2021. http://hdl.handle.net/2027.42/145845.

MLA Handbook (7th Edition):

Jia, Yunhan. “Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms.” 2018. Web. 24 Jan 2021.

Vancouver:

Jia Y. Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms. [Internet] [Doctoral dissertation]. University of Michigan; 2018. [cited 2021 Jan 24]. Available from: http://hdl.handle.net/2027.42/145845.

Council of Science Editors:

Jia Y. Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms. [Doctoral Dissertation]. University of Michigan; 2018. Available from: http://hdl.handle.net/2027.42/145845

[1] [2]

.