Author:
Viega J.,Bloch J.T.,Kohno Y.,McGraw G.
Cited by
109 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption;Journal of Information Security and Applications;2024-08
2. Early and Realistic Exploitability Prediction of Just-Disclosed Software Vulnerabilities: How Reliable Can It Be?;ACM Transactions on Software Engineering and Methodology;2024-06-27
3. Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation;Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems;2024-06-20
4. A Proactive Approach for Detecting SQL and XSS Injection Attacks;2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2024-06-05
5. Evaluating the effectiveness of a security flaws prevention tool;Information and Software Technology;2024-06