Search Results - "name=General Computer Science"

Refine Results
  1. 1

    Source: Şentürk, Ş, Garousi, V & Yumuşak, N 2025, 'A case study of gray-box fuzzing with byte-and tree-level mutation strategies in XML-based applications for exposing security vulnerabilities', Turkish Journal of Electrical Engineering and Computer Sciences, vol. 33, no. 2, 2, pp. 86-105. https://doi.org/10.55730/1300-0632.4116

    File Description: application/pdf

  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Source: Siddiqui, F, Ahlbrecht, A, Khan, R, Yengec Tasdemir, S, Hui, H, Sonigara, B, Sezer, S, McLaughlin, K, Zaeske, W & Durak, U 2023, Cybersecurity engineering: bridging the security gaps in avionic architectures and DO-326A/ED-202A. in 2023 AIAA/IEEE 42nd Digital Avionics Systems Conference (DASC): proceedings. AIAA/IEEE Digital Avionics Systems Conference (DASC): Proceedings, Institute of Electrical and Electronics Engineers Inc., 42nd AIAA/IEEE Digital Avionics Systems Conference, Barcelona, Spain, 01/10/2023. https://doi.org/10.1109/DASC58513.2023.10311187
    2023 IEEE/AIAA 42nd Digital Avionics Systems Conference (DASC)

    File Description: application/pdf

  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Source: IEEE Access, Vol 12, Pp 157050-157066 (2024)
    Adebayo, S, Mcloone, S & Dessing, J C 2024, 'QUB-PHEO: a visual-based dyadic multi-view dataset for intention inference in collaborative assembly', IEEE Access, vol. 12, pp. 157050-157066. https://doi.org/10.1109/ACCESS.2024.3485162

    File Description: application/pdf

  19. 19
  20. 20