Search Results - "Vulnerable JavaScript"
-
1
Authors: Abdullah Sheneamer
Source: PeerJ Computer Science, Vol 10, p e1838 (2024)
Subject Terms: Vulnerable Javascript functions detection, Code security, Security of web applications, JavaScript engine vulnerability, Cross-site scripting detection, Stacking convolutional neural networks (CNNs), Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
2
Authors:
Source: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. :917-930
-
3
Authors: et al.
-
4
Authors: et al.
Source: 2019 IEEE/ACM 7th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE). :8-14
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Cryptography and Security, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 15. Life on land, 16. Peace & justice, Cryptography and Security (cs.CR), 3. Good health
File Description: text
Access URL: http://arxiv.org/abs/2405.07213
-
5
Authors: et al.
Source: Proceedings of the 2011 International Symposium on Software Testing and Analysis. :177-187
-
6
Authors: et al.
Source: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER).
-
7
Authors:
Contributors:
-
8
Authors:
Source: ACM Transactions on Privacy & Security; Feb2024, Vol. 27 Issue 1, p1-37, 37p
-
9
Authors: Pasani, Kian
Index Terms: Bachelor Thesis, NonPeerReviewed, info:eu-repo/semantics/bachelorThesis
-
10
Authors:
-
11
Authors:
Source: Empirical Software Engineering; Feb2026, Vol. 31 Issue 1, p1-37, 37p
-
12
Authors: et al.
Source: Cybersecurity (2523-3246); 12/29/2025, Vol. 8 Issue 1, p1-20, 20p
Subject Terms: PRIVACY, AUTOMATIC tracking, PROGRAMMING languages, CONSENT (Law), WEBSITES
Reviews & Products: ANDROID (Operating system)
-
13
Authors: et al.
Source: Bulletin of Electrical Engineering & Informatics; Dec2025, Vol. 14 Issue 6, p4651-4664, 14p
Subject Terms: HIGHER education, PRIVATE universities & colleges, WEBSITE security, PENETRATION testing (Computer security), PUBLIC universities & colleges, INTERNET security
Geographic Terms: BANGLADESH
-
14
Authors:
Source: International Journal of Safety & Security Engineering; Oct2025, Vol. 15 Issue 10, p2061-2068, 8p
Subject Terms: DIGITAL forensics, DATA security failures, COMMUNITY-based participatory research, INDONESIANS, ACCURACY of information, LEADERSHIP ethics, EVALUATION methodology
Geographic Terms: INDONESIA
-
15
Authors: et al.
Source: International Journal of Safety & Security Engineering; Jul2025, Vol. 15 Issue 7, p1527-1539, 13p
-
16
Authors:
Source: Jurnal Teknik Industri Terintegrasi (JUTIN); Vol. 8 No. 4 (2025): October; 3862-3874
Subject Terms: Website Security, OWASP ZAP, Nmap, Vulnerability Assessment, Village Website
File Description: application/pdf
-
17
Authors: et al.
Source: Empirical Software Engineering; Jun2025, Vol. 30 Issue 3, p1-37, 37p
-
18
Authors:
Source: Electronics (2079-9292); Mar2025, Vol. 14 Issue 6, p1174, 26p
Subject Terms: LONG short-term memory
-
19
Authors:
Source: PLoS ONE; 1/7/2025, Vol. 20 Issue 1, p1-24, 24p
Subject Terms: FAULT tolerance (Engineering), SYSTEM failures, INTERNET of things, BLOCKCHAINS, DEEP learning, CLASSIFICATION
-
20
Authors:
Source: e-Informatica; 2025, Vol. 19 Issue 1, p1-44, 44p
Full Text Finder
Nájsť tento článok vo Web of Science