Zobrazeno 1 - 10
of 26
pro vyhledávání: '"ISLAM, CHADNI"'
The increasing trend of using Large Language Models (LLMs) for code generation raises the question of their capability to generate trustworthy code. While many researchers are exploring the utility of code generation for uncovering software vulnerabi
Externí odkaz:
http://arxiv.org/abs/2404.03823
Autor:
Hasan, Khondokar Fida, Simpson, Leonie, Baee, Mir Ali Rezazadeh, Islam, Chadni, Rahman, Ziaur, Armstrong, Warren, Gauravaram, Praveen, McKague, Matthew
Quantum computing is emerging as a significant threat to information protected by widely used cryptographic systems. Cryptographic methods, once deemed secure for decades, are now at risk of being compromised, posing a massive threat to the security
Externí odkaz:
http://arxiv.org/abs/2307.06520
An Operating System (OS) combines multiple interdependent software packages, which usually have their own independently developed architectures. When a multitude of independent packages are placed together in an OS, an implicit inter-package architec
Externí odkaz:
http://arxiv.org/abs/2307.04458
Security Application Programming Interfaces (APIs) are crucial for ensuring software security. However, their misuse introduces vulnerabilities, potentially leading to severe data breaches and substantial financial loss. Complex API design, inadequat
Externí odkaz:
http://arxiv.org/abs/2306.08869
Runtime software patching aims to minimize or eliminate service downtime, user interruptions and potential data losses while deploying a patch. Due to modern software systems' high variance and heterogeneity, no universal solutions are available or p
Externí odkaz:
http://arxiv.org/abs/2203.12132
A wide variety of Cyber Threat Information (CTI) is used by Security Operation Centres (SOCs) to perform validation of security incidents and alerts. Security experts manually define different types of rules and scripts based on CTI to perform valida
Externí odkaz:
http://arxiv.org/abs/2203.07603
Security Orchestration, Automation, and Response (SOAR) platforms integrate and orchestrate a wide variety of security tools to accelerate the operational activities of Security Operation Center (SOC). Integration of security tools in a SOAR platform
Externí odkaz:
http://arxiv.org/abs/2201.07959
Publikováno v:
ACM Comput. Surv. 52, 2, Article 37 (April 2019), 45 pages
Organizations use diverse types of security solutions to prevent cyberattacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security
Externí odkaz:
http://arxiv.org/abs/2002.09190
Publikováno v:
In The Journal of Systems & Software June 2023 200
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.